Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0492 (GCVE-0-2022-0492)
Vulnerability from cvelistv5
Published
2022-03-03 00:00
Modified
2024-08-02 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:45.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af" }, { "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" }, { "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" }, { "name": "DSA-5095", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5095" }, { "name": "DSA-5096", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5096" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220419-0002/" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "n/a", "versions": [ { "status": "affected", "version": "kernel 5.17 rc3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T15:06:18.421771", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505" }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af" }, { "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html" }, { "name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html" }, { "name": "DSA-5095", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5095" }, { "name": "DSA-5096", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5096" }, { "url": "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html" }, { "url": "https://security.netapp.com/advisory/ntap-20220419-0002/" }, { "url": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html" }, { "url": "http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-0492", "datePublished": "2022-03-03T00:00:00", "dateReserved": "2022-02-04T00:00:00", "dateUpdated": "2024-08-02T23:32:45.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-0492\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-03-03T19:15:08.633\",\"lastModified\":\"2024-11-21T06:38:46.193\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad en la funci\u00f3n cgroup_release_agent_write en el archivo kernel/cgroup/cgroup-v1.c del kernel de Linux. Este fallo, bajo determinadas circunstancias, permite el uso de la funci\u00f3n cgroups v1 release_agent para escalar privilegios y saltarse el aislamiento del espacio de nombres de forma no esperada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":6.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.24\",\"versionEndExcluding\":\"4.9.301\",\"matchCriteriaId\":\"006C09FF-C563-403E-8723-2A252C409D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.266\",\"matchCriteriaId\":\"C53477E7-1AB3-4CCB-BA3A-8CA6D288B41B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.229\",\"matchCriteriaId\":\"E67EAACB-63BB-41E7-9FE0-EC45ECD8CFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.177\",\"matchCriteriaId\":\"B42832A3-1D9B-4BE0-8D4C-3AF681B52D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.97\",\"matchCriteriaId\":\"FB2BE440-BF07-4C49-9A0C-A63E4FA103A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.20\",\"matchCriteriaId\":\"C68FC5B4-CC13-45E9-8050-EF9025F7A9B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.16.6\",\"matchCriteriaId\":\"6739D89E-32C3-479D-B5F6-6865C5061FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6E34B23-78B4-4516-9BD8-61B33F4AC49A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A089E2-D66E-455C-969A-3140D991BAF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF2FF4AA-3027-4F30-9F2A-3E820BBA8BF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F48D0CB-CB06-4456-B918-6549BC6C7892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F15192F-C162-4D4F-ABBC-7CE66BD923A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB28F9AF-3D06-4532-B397-96D7E4792503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C21FE1-EA5C-498F-9C6C-D05F91A88217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE1552C-9398-4952-AD8C-777DF9587043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47811209-5CE5-4375-8391-B0A7F6A0E420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD90EA8-3C35-48E1-A3B5-FEB6E3207E62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5C134ED-8708-42B5-8138-AEA47ED9CBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C61DDC-81F3-4E2D-9CAA-17A256C85443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C3BAE34-5AFC-4EED-B6C0-5CC47CDFB416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92409A9-0D6B-4B7E-8847-1B63837D201F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF2B9A2-8CA6-4EDF-9975-07265E363ED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA6A5AF-2EBE-4ED9-B312-DCD9D150D031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48C2E003-A71C-4D06-B8B3-F93160568182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3921C1CF-A16D-4727-99AD-03EFFA7C91CA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"359012F1-2C63-415A-88B8-6726A87830DE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire\\\\,_enterprise_sds_\\\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\\u0026_hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2051505\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220419-0002/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5095\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2051505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220419-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
wid-sec-w-2023-0137
Vulnerability from csaf_certbund
Published
2023-01-17 23:00
Modified
2024-11-21 23:00
Summary
Oracle Communications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Communications umfasst branchenspezifische Lösungen für die Telekommunikationsbranche.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0137 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0137.json" }, { "category": "self", "summary": "WID-SEC-2023-0137 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0137" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Communications vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixCGBU" }, { "category": "external", "summary": "IBM Security Bulletin 6963077 vom 2023-03-13", "url": "https://www.ibm.com/support/pages/node/6963077" }, { "category": "external", "summary": "Hitachi Software Vulnerability Information hitachi-sec-2023-117 vom 2023-05-23", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-117/index.html" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-21T23:00:00.000+00:00", "generator": { "date": "2024-11-22T10:07:31.213+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2023-0137", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-03-13T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.3", "product": { "name": "IBM Security Guardium 11.3", "product_id": "1048943", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.3" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1.11.0", "product": { "name": "Oracle Communications 1.11.0", "product_id": "T020684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:1.11.0" } } }, { "category": "product_version", "name": "22.1.0", "product": { "name": "Oracle Communications 22.1.0", "product_id": "T022812", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0" } } }, { "category": "product_version", "name": "22.2.0", "product": { "name": "Oracle Communications 22.2.0", "product_id": "T023908", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.0" } } }, { "category": "product_version", "name": "22.1.1", "product": { "name": "Oracle Communications 22.1.1", "product_id": "T023910", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.1" } } }, { "category": "product_version", "name": "22.2.1", "product": { "name": "Oracle Communications 22.2.1", "product_id": "T024969", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.1" } } }, { "category": "product_version", "name": "8.6.0.0", "product": { "name": "Oracle Communications 8.6.0.0", "product_id": "T024970", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.0" } } }, { "category": "product_version", "name": "22.3.0", "product": { "name": "Oracle Communications 22.3.0", "product_id": "T024974", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.0" } } }, { "category": "product_version", "name": "22.2.2", "product": { "name": "Oracle Communications 22.2.2", "product_id": "T024978", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.2" } } }, { "category": "product_version", "name": "22.2.3", "product": { "name": "Oracle Communications 22.2.3", "product_id": "T024979", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.3" } } }, { "category": "product_version", "name": "22.3.1", "product": { "name": "Oracle Communications 22.3.1", "product_id": "T024980", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.1" } } }, { "category": "product_version_range", "name": "\u003c=22.4.0", "product": { "name": "Oracle Communications \u003c=22.4.0", "product_id": "T024981" } }, { "category": "product_version_range", "name": "\u003c=22.4.0", "product": { "name": "Oracle Communications \u003c=22.4.0", "product_id": "T024981-fixed" } }, { "category": "product_version", "name": "22.3.3", "product": { "name": "Oracle Communications 22.3.3", "product_id": "T025862", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.3" } } }, { "category": "product_version", "name": "22.1.0.0.0", "product": { "name": "Oracle Communications 22.1.0.0.0", "product_id": "T025863", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0.0.0" } } }, { "category": "product_version", "name": "22.2.4", "product": { "name": "Oracle Communications 22.2.4", "product_id": "T025864", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.4" } } }, { "category": "product_version", "name": "22.3.2", "product": { "name": "Oracle Communications 22.3.2", "product_id": "T025865", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.2" } } }, { "category": "product_version", "name": "22.3.4", "product": { "name": "Oracle Communications 22.3.4", "product_id": "T025866", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.4" } } }, { "category": "product_version", "name": "7.1.0", "product": { "name": "Oracle Communications 7.1.0", "product_id": "T025867", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:7.1.0" } } }, { "category": "product_version", "name": "8.0.0", "product": { "name": "Oracle Communications 8.0.0", "product_id": "T025868", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.0.0" } } }, { "category": "product_version", "name": "22.4.1", "product": { "name": "Oracle Communications 22.4.1", "product_id": "T025869", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.1" } } }, { "category": "product_version", "name": "22.0.0.0.0", "product": { "name": "Oracle Communications 22.0.0.0.0", "product_id": "T025870", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.0.0.0.0" } } }, { "category": "product_version", "name": "8.2.3.0", "product": { "name": "Oracle Communications 8.2.3.0", "product_id": "T025871", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.2.3.0" } } }, { "category": "product_version", "name": "10.4.0.4.1", "product": { "name": "Oracle Communications 10.4.0.4.1", "product_id": "T025872", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.4.0.4.1" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1273", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2018-1273" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2021-40528", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2021-40528" }, { "cve": "CVE-2022-0084", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-0084" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0934", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-0934" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1319", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-1319" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-2053", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2053" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-27404", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-27404" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-30293", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-30293" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-31629", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-31629" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-34305", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-34305" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-4147", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-4147" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-43403", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-43403" }, { "cve": "CVE-2023-21890", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2023-21890" } ] }
WID-SEC-W-2022-0515
Vulnerability from csaf_certbund
Published
2022-06-29 22:00
Modified
2023-06-08 22:00
Summary
IBM Spectrum Protect: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Spectrum Protect ist eine zentralisierte Backuplösung für Systeme im Netzwerk.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:29:37.582+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-28327" } ] }
WID-SEC-W-2023-0137
Vulnerability from csaf_certbund
Published
2023-01-17 23:00
Modified
2024-11-21 23:00
Summary
Oracle Communications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Communications umfasst branchenspezifische Lösungen für die Telekommunikationsbranche.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0137 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0137.json" }, { "category": "self", "summary": "WID-SEC-2023-0137 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0137" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Communications vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixCGBU" }, { "category": "external", "summary": "IBM Security Bulletin 6963077 vom 2023-03-13", "url": "https://www.ibm.com/support/pages/node/6963077" }, { "category": "external", "summary": "Hitachi Software Vulnerability Information hitachi-sec-2023-117 vom 2023-05-23", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-117/index.html" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-21T23:00:00.000+00:00", "generator": { "date": "2024-11-22T10:07:31.213+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2023-0137", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-03-13T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.3", "product": { "name": "IBM Security Guardium 11.3", "product_id": "1048943", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.3" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1.11.0", "product": { "name": "Oracle Communications 1.11.0", "product_id": "T020684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:1.11.0" } } }, { "category": "product_version", "name": "22.1.0", "product": { "name": "Oracle Communications 22.1.0", "product_id": "T022812", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0" } } }, { "category": "product_version", "name": "22.2.0", "product": { "name": "Oracle Communications 22.2.0", "product_id": "T023908", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.0" } } }, { "category": "product_version", "name": "22.1.1", "product": { "name": "Oracle Communications 22.1.1", "product_id": "T023910", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.1" } } }, { "category": "product_version", "name": "22.2.1", "product": { "name": "Oracle Communications 22.2.1", "product_id": "T024969", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.1" } } }, { "category": "product_version", "name": "8.6.0.0", "product": { "name": "Oracle Communications 8.6.0.0", "product_id": "T024970", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.0" } } }, { "category": "product_version", "name": "22.3.0", "product": { "name": "Oracle Communications 22.3.0", "product_id": "T024974", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.0" } } }, { "category": "product_version", "name": "22.2.2", "product": { "name": "Oracle Communications 22.2.2", "product_id": "T024978", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.2" } } }, { "category": "product_version", "name": "22.2.3", "product": { "name": "Oracle Communications 22.2.3", "product_id": "T024979", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.3" } } }, { "category": "product_version", "name": "22.3.1", "product": { "name": "Oracle Communications 22.3.1", "product_id": "T024980", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.1" } } }, { "category": "product_version_range", "name": "\u003c=22.4.0", "product": { "name": "Oracle Communications \u003c=22.4.0", "product_id": "T024981" } }, { "category": "product_version_range", "name": "\u003c=22.4.0", "product": { "name": "Oracle Communications \u003c=22.4.0", "product_id": "T024981-fixed" } }, { "category": "product_version", "name": "22.3.3", "product": { "name": "Oracle Communications 22.3.3", "product_id": "T025862", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.3" } } }, { "category": "product_version", "name": "22.1.0.0.0", "product": { "name": "Oracle Communications 22.1.0.0.0", "product_id": "T025863", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0.0.0" } } }, { "category": "product_version", "name": "22.2.4", "product": { "name": "Oracle Communications 22.2.4", "product_id": "T025864", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.4" } } }, { "category": "product_version", "name": "22.3.2", "product": { "name": "Oracle Communications 22.3.2", "product_id": "T025865", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.2" } } }, { "category": "product_version", "name": "22.3.4", "product": { "name": "Oracle Communications 22.3.4", "product_id": "T025866", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.4" } } }, { "category": "product_version", "name": "7.1.0", "product": { "name": "Oracle Communications 7.1.0", "product_id": "T025867", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:7.1.0" } } }, { "category": "product_version", "name": "8.0.0", "product": { "name": "Oracle Communications 8.0.0", "product_id": "T025868", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.0.0" } } }, { "category": "product_version", "name": "22.4.1", "product": { "name": "Oracle Communications 22.4.1", "product_id": "T025869", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.1" } } }, { "category": "product_version", "name": "22.0.0.0.0", "product": { "name": "Oracle Communications 22.0.0.0.0", "product_id": "T025870", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.0.0.0.0" } } }, { "category": "product_version", "name": "8.2.3.0", "product": { "name": "Oracle Communications 8.2.3.0", "product_id": "T025871", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.2.3.0" } } }, { "category": "product_version", "name": "10.4.0.4.1", "product": { "name": "Oracle Communications 10.4.0.4.1", "product_id": "T025872", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.4.0.4.1" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1273", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2018-1273" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2021-40528", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2021-40528" }, { "cve": "CVE-2022-0084", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-0084" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0934", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-0934" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1319", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-1319" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-2053", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2053" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-27404", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-27404" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-30293", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-30293" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-31629", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-31629" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-34305", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-34305" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-4147", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-4147" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-43403", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-43403" }, { "cve": "CVE-2023-21890", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T020684", "T024969", "T023910", "T025872", "T024980", "T025871", "T025870", "T015632", "T017562", "T024979", "T022812", "T024978", "T025869", "T025866", "T024974", "T025865", "T025868", "T025867", "T025862", "T024970", "T025864", "T025863", "T026399" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2023-21890" } ] }
WID-SEC-W-2022-0137
Vulnerability from csaf_certbund
Published
2022-06-06 22:00
Modified
2024-06-24 22:00
Summary
Android Patchday Juni 2022
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Android
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Android Betriebssystem von Google ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Android", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0137 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0137.json" }, { "category": "self", "summary": "WID-SEC-2022-0137 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0137" }, { "category": "external", "summary": "Android Security Advisory vom 2022-06-06", "url": "https://source.android.com/security/bulletin/2022-06-01" }, { "category": "external", "summary": "Pixel Security Advisory vom 2022-06-06", "url": "https://source.android.com/security/bulletin/pixel/2022-06-01" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2423-1 vom 2022-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2422-1 vom 2022-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2443-1 vom 2022-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011597.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2435-1 vom 2022-07-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011594.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2445-1 vom 2022-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2460-1 vom 2022-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011608.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2461-1 vom 2022-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2516-1 vom 2022-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2515-1 vom 2022-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2697-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2696-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2699-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2728-1 vom 2022-08-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2779-1 vom 2022-08-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2809-1 vom 2022-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0412 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-073 vom 2024-06-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-073.html" } ], "source_lang": "en-US", "title": "Android Patchday Juni 2022", "tracking": { "current_release_date": "2024-06-24T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:26:47.711+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0137", "initial_release_date": "2022-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-18T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-15T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-24T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "13" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11", "product": { "name": "Google Android 11", "product_id": "T017166", "product_identification_helper": { "cpe": "cpe:/o:google:android:11" } } }, { "category": "product_version", "name": "10", "product": { "name": "Google Android 10", "product_id": "T019174", "product_identification_helper": { "cpe": "cpe:/o:google:android:10" } } }, { "category": "product_version", "name": "12", "product": { "name": "Google Android 12", "product_id": "T020881", "product_identification_helper": { "cpe": "cpe:/o:google:android:12" } } }, { "category": "product_version", "name": "12L", "product": { "name": "Google Android 12L", "product_id": "T023028", "product_identification_helper": { "cpe": "cpe:/o:google:android:12l" } } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25020", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2018-25020" }, { "cve": "CVE-2021-0983", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-0983" }, { "cve": "CVE-2021-20268", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-20268" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-31440", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-31440" }, { "cve": "CVE-2021-34556", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-34556" }, { "cve": "CVE-2021-35083", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35083" }, { "cve": "CVE-2021-35102", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35102" }, { "cve": "CVE-2021-35111", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35111" }, { "cve": "CVE-2021-35118", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35118" }, { "cve": "CVE-2021-35119", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35119" }, { "cve": "CVE-2021-35120", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35120" }, { "cve": "CVE-2021-35121", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35121" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3715", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3715" }, { "cve": "CVE-2021-3743", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3743" }, { "cve": "CVE-2021-3753", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3753" }, { "cve": "CVE-2021-38160", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-38160" }, { "cve": "CVE-2021-39624", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39624" }, { "cve": "CVE-2021-39653", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39653" }, { "cve": "CVE-2021-39691", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39691" }, { "cve": "CVE-2021-39806", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39806" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-44733" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-20006", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20006" }, { "cve": "CVE-2022-20123", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20123" }, { "cve": "CVE-2022-20124", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20124" }, { "cve": "CVE-2022-20125", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20125" }, { "cve": "CVE-2022-20126", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20126" }, { "cve": "CVE-2022-20127", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20127" }, { "cve": "CVE-2022-20129", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20129" }, { "cve": "CVE-2022-20130", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20130" }, { "cve": "CVE-2022-20131", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20131" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20133", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20133" }, { "cve": "CVE-2022-20134", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20134" }, { "cve": "CVE-2022-20135", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20135" }, { "cve": "CVE-2022-20136", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20136" }, { "cve": "CVE-2022-20137", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20137" }, { "cve": "CVE-2022-20138", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20138" }, { "cve": "CVE-2022-20139", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20139" }, { "cve": "CVE-2022-20140", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20140" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20142", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20142" }, { "cve": "CVE-2022-20143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20143" }, { "cve": "CVE-2022-20144", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20144" }, { "cve": "CVE-2022-20145", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20145" }, { "cve": "CVE-2022-20146", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20146" }, { "cve": "CVE-2022-20147", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20147" }, { "cve": "CVE-2022-20148", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20148" }, { "cve": "CVE-2022-20149", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20149" }, { "cve": "CVE-2022-20150", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20150" }, { "cve": "CVE-2022-20151", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20151" }, { "cve": "CVE-2022-20152", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20152" }, { "cve": "CVE-2022-20153", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20153" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20155", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20155" }, { "cve": "CVE-2022-20156", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20156" }, { "cve": "CVE-2022-20157", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20157" }, { "cve": "CVE-2022-20159", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20159" }, { "cve": "CVE-2022-20160", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20160" }, { "cve": "CVE-2022-20162", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20162" }, { "cve": "CVE-2022-20164", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20164" }, { "cve": "CVE-2022-20165", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20165" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20167", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20167" }, { "cve": "CVE-2022-20168", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20168" }, { "cve": "CVE-2022-20169", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20169" }, { "cve": "CVE-2022-20170", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20170" }, { "cve": "CVE-2022-20171", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20171" }, { "cve": "CVE-2022-20172", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20172" }, { "cve": "CVE-2022-20173", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20173" }, { "cve": "CVE-2022-20174", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20174" }, { "cve": "CVE-2022-20175", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20175" }, { "cve": "CVE-2022-20176", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20176" }, { "cve": "CVE-2022-20177", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20177" }, { "cve": "CVE-2022-20178", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20178" }, { "cve": "CVE-2022-20179", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20179" }, { "cve": "CVE-2022-20181", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20181" }, { "cve": "CVE-2022-20182", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20182" }, { "cve": "CVE-2022-20183", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20183" }, { "cve": "CVE-2022-20184", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20184" }, { "cve": "CVE-2022-20185", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20185" }, { "cve": "CVE-2022-20186", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20186" }, { "cve": "CVE-2022-20187", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20187" }, { "cve": "CVE-2022-20188", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20188" }, { "cve": "CVE-2022-20190", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20190" }, { "cve": "CVE-2022-20191", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20191" }, { "cve": "CVE-2022-20192", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20192" }, { "cve": "CVE-2022-20193", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20193" }, { "cve": "CVE-2022-20194", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20194" }, { "cve": "CVE-2022-20195", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20195" }, { "cve": "CVE-2022-20196", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20196" }, { "cve": "CVE-2022-20197", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20197" }, { "cve": "CVE-2022-20198", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20198" }, { "cve": "CVE-2022-20200", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20200" }, { "cve": "CVE-2022-20201", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20201" }, { "cve": "CVE-2022-20202", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20202" }, { "cve": "CVE-2022-20204", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20204" }, { "cve": "CVE-2022-20205", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20205" }, { "cve": "CVE-2022-20206", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20206" }, { "cve": "CVE-2022-20207", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20207" }, { "cve": "CVE-2022-20208", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20208" }, { "cve": "CVE-2022-20209", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20209" }, { "cve": "CVE-2022-20210", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20210" }, { "cve": "CVE-2022-20233", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20233" }, { "cve": "CVE-2022-21745", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-21745" }, { "cve": "CVE-2022-22082", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22082" }, { "cve": "CVE-2022-22083", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22083" }, { "cve": "CVE-2022-22084", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22084" }, { "cve": "CVE-2022-22085", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22085" }, { "cve": "CVE-2022-22086", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22086" }, { "cve": "CVE-2022-22087", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22087" }, { "cve": "CVE-2022-22090", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22090" }, { "cve": "CVE-2022-23222", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-23222" }, { "cve": "CVE-2022-24958", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-24958" }, { "cve": "CVE-2022-25258", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-25258" }, { "cve": "CVE-2022-26966", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-26966" } ] }
wid-sec-w-2022-0137
Vulnerability from csaf_certbund
Published
2022-06-06 22:00
Modified
2024-06-24 22:00
Summary
Android Patchday Juni 2022
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Android
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Android Betriebssystem von Google ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Android", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0137 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0137.json" }, { "category": "self", "summary": "WID-SEC-2022-0137 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0137" }, { "category": "external", "summary": "Android Security Advisory vom 2022-06-06", "url": "https://source.android.com/security/bulletin/2022-06-01" }, { "category": "external", "summary": "Pixel Security Advisory vom 2022-06-06", "url": "https://source.android.com/security/bulletin/pixel/2022-06-01" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2423-1 vom 2022-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2422-1 vom 2022-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2443-1 vom 2022-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011597.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2435-1 vom 2022-07-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011594.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2445-1 vom 2022-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2460-1 vom 2022-07-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011608.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2461-1 vom 2022-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2516-1 vom 2022-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2515-1 vom 2022-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2697-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2696-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2699-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2728-1 vom 2022-08-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2779-1 vom 2022-08-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2809-1 vom 2022-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0412 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-073 vom 2024-06-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-073.html" } ], "source_lang": "en-US", "title": "Android Patchday Juni 2022", "tracking": { "current_release_date": "2024-06-24T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:26:47.711+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0137", "initial_release_date": "2022-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-18T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-15T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-24T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "13" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11", "product": { "name": "Google Android 11", "product_id": "T017166", "product_identification_helper": { "cpe": "cpe:/o:google:android:11" } } }, { "category": "product_version", "name": "10", "product": { "name": "Google Android 10", "product_id": "T019174", "product_identification_helper": { "cpe": "cpe:/o:google:android:10" } } }, { "category": "product_version", "name": "12", "product": { "name": "Google Android 12", "product_id": "T020881", "product_identification_helper": { "cpe": "cpe:/o:google:android:12" } } }, { "category": "product_version", "name": "12L", "product": { "name": "Google Android 12L", "product_id": "T023028", "product_identification_helper": { "cpe": "cpe:/o:google:android:12l" } } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25020", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2018-25020" }, { "cve": "CVE-2021-0983", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-0983" }, { "cve": "CVE-2021-20268", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-20268" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-31440", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-31440" }, { "cve": "CVE-2021-34556", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-34556" }, { "cve": "CVE-2021-35083", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35083" }, { "cve": "CVE-2021-35102", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35102" }, { "cve": "CVE-2021-35111", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35111" }, { "cve": "CVE-2021-35118", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35118" }, { "cve": "CVE-2021-35119", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35119" }, { "cve": "CVE-2021-35120", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35120" }, { "cve": "CVE-2021-35121", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-35121" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3715", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3715" }, { "cve": "CVE-2021-3743", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3743" }, { "cve": "CVE-2021-3753", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-3753" }, { "cve": "CVE-2021-38160", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-38160" }, { "cve": "CVE-2021-39624", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39624" }, { "cve": "CVE-2021-39653", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39653" }, { "cve": "CVE-2021-39691", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39691" }, { "cve": "CVE-2021-39806", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-39806" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2021-44733" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-20006", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20006" }, { "cve": "CVE-2022-20123", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20123" }, { "cve": "CVE-2022-20124", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20124" }, { "cve": "CVE-2022-20125", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20125" }, { "cve": "CVE-2022-20126", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20126" }, { "cve": "CVE-2022-20127", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20127" }, { "cve": "CVE-2022-20129", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20129" }, { "cve": "CVE-2022-20130", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20130" }, { "cve": "CVE-2022-20131", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20131" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20133", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20133" }, { "cve": "CVE-2022-20134", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20134" }, { "cve": "CVE-2022-20135", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20135" }, { "cve": "CVE-2022-20136", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20136" }, { "cve": "CVE-2022-20137", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20137" }, { "cve": "CVE-2022-20138", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20138" }, { "cve": "CVE-2022-20139", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20139" }, { "cve": "CVE-2022-20140", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20140" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20142", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20142" }, { "cve": "CVE-2022-20143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20143" }, { "cve": "CVE-2022-20144", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20144" }, { "cve": "CVE-2022-20145", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20145" }, { "cve": "CVE-2022-20146", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20146" }, { "cve": "CVE-2022-20147", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20147" }, { "cve": "CVE-2022-20148", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20148" }, { "cve": "CVE-2022-20149", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20149" }, { "cve": "CVE-2022-20150", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20150" }, { "cve": "CVE-2022-20151", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20151" }, { "cve": "CVE-2022-20152", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20152" }, { "cve": "CVE-2022-20153", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20153" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20155", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20155" }, { "cve": "CVE-2022-20156", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20156" }, { "cve": "CVE-2022-20157", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20157" }, { "cve": "CVE-2022-20159", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20159" }, { "cve": "CVE-2022-20160", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20160" }, { "cve": "CVE-2022-20162", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20162" }, { "cve": "CVE-2022-20164", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20164" }, { "cve": "CVE-2022-20165", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20165" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20167", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20167" }, { "cve": "CVE-2022-20168", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20168" }, { "cve": "CVE-2022-20169", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20169" }, { "cve": "CVE-2022-20170", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20170" }, { "cve": "CVE-2022-20171", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20171" }, { "cve": "CVE-2022-20172", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20172" }, { "cve": "CVE-2022-20173", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20173" }, { "cve": "CVE-2022-20174", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20174" }, { "cve": "CVE-2022-20175", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20175" }, { "cve": "CVE-2022-20176", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20176" }, { "cve": "CVE-2022-20177", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20177" }, { "cve": "CVE-2022-20178", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20178" }, { "cve": "CVE-2022-20179", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20179" }, { "cve": "CVE-2022-20181", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20181" }, { "cve": "CVE-2022-20182", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20182" }, { "cve": "CVE-2022-20183", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20183" }, { "cve": "CVE-2022-20184", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20184" }, { "cve": "CVE-2022-20185", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20185" }, { "cve": "CVE-2022-20186", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20186" }, { "cve": "CVE-2022-20187", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20187" }, { "cve": "CVE-2022-20188", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20188" }, { "cve": "CVE-2022-20190", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20190" }, { "cve": "CVE-2022-20191", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20191" }, { "cve": "CVE-2022-20192", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20192" }, { "cve": "CVE-2022-20193", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20193" }, { "cve": "CVE-2022-20194", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20194" }, { "cve": "CVE-2022-20195", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20195" }, { "cve": "CVE-2022-20196", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20196" }, { "cve": "CVE-2022-20197", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20197" }, { "cve": "CVE-2022-20198", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20198" }, { "cve": "CVE-2022-20200", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20200" }, { "cve": "CVE-2022-20201", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20201" }, { "cve": "CVE-2022-20202", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20202" }, { "cve": "CVE-2022-20204", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20204" }, { "cve": "CVE-2022-20205", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20205" }, { "cve": "CVE-2022-20206", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20206" }, { "cve": "CVE-2022-20207", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20207" }, { "cve": "CVE-2022-20208", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20208" }, { "cve": "CVE-2022-20209", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20209" }, { "cve": "CVE-2022-20210", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20210" }, { "cve": "CVE-2022-20233", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-20233" }, { "cve": "CVE-2022-21745", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-21745" }, { "cve": "CVE-2022-22082", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22082" }, { "cve": "CVE-2022-22083", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22083" }, { "cve": "CVE-2022-22084", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22084" }, { "cve": "CVE-2022-22085", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22085" }, { "cve": "CVE-2022-22086", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22086" }, { "cve": "CVE-2022-22087", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22087" }, { "cve": "CVE-2022-22090", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-22090" }, { "cve": "CVE-2022-23222", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-23222" }, { "cve": "CVE-2022-24958", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-24958" }, { "cve": "CVE-2022-25258", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-25258" }, { "cve": "CVE-2022-26966", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren und einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166" ] }, "release_date": "2022-06-06T22:00:00.000+00:00", "title": "CVE-2022-26966" } ] }
wid-sec-w-2022-0515
Vulnerability from csaf_certbund
Published
2022-06-29 22:00
Modified
2023-06-08 22:00
Summary
IBM Spectrum Protect: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Spectrum Protect ist eine zentralisierte Backuplösung für Systeme im Netzwerk.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:29:37.582+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00.000+00:00", "title": "CVE-2022-28327" } ] }
opensuse-su-2022:0755-1
Vulnerability from csaf_opensuse
Published
2022-03-08 18:02
Modified
2022-03-08 18:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
The following non-security bugs were fixed:
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Bluetooth: refactor malicious adv data check (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- KVM: remember position in kvm->vcpus array (bsc#1190972 LTC#194674).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags->rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags->rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq->refcount before calling ->fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-multipath: fix ANA state updates when a namespace is not present (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- nvme: refactor ns->ctrl by request (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- tty: Add support for Brainboxes UC cards (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
openSUSE-SLE-15.3-2022-755
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ASoC: Revert \u0027ASoC: mediatek: Check for error clk pointer\u0027 (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).\n- Bluetooth: refactor malicious adv data check (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1178134).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- IB/cm: Avoid a loop when device has 255 ports (git-fixes)\n- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).\n- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/isert: Fix a use after free in isert_connect_request (git-fixes)\n- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)\n- IB/mlx5: Add missing error code (git-fixes)\n- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)\n- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)\n- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- Input: wm97xx: Simplify resource management (git-fixes).\n- KVM: remember position in kvm-\u003evcpus array (bsc#1190972 LTC#194674).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).\n- RDMA/core: Always release restrack object (git-fixes)\n- RDMA/core: Do not access cm_id after its destruction (git-fixes)\n- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)\n- RDMA/core: Fix corrupted SL on passive side (git-fixes)\n- RDMA/core: Unify RoCE check and re-factor code (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)\n- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)\n- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)\n- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)\n- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)\n- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)\n- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)\n- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)\n- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)\n- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)\n- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)\n- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)\n- RDMA/siw: Release xarray entry (git-fixes)\n- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: mos7840: fix probe error handling (git-fixes).\n- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).\n- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).\n- blk-mq: avoid to iterate over stale request (bsc#1193787).\n- blk-mq: clear stale request in tags-\u003erq before freeing one request pool (bsc#1193787).\n- blk-mq: clearing flush request reference in tags-\u003erqs (bsc#1193787).\n- blk-mq: do not grab rq\u0027s refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).\n- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).\n- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).\n- blk-mq: grab rq-\u003erefcount before calling -\u003efn in blk_mq_tagset_busy_iter (bsc#1193787).\n- blk-mq: introduce blk_mq_set_request_complete (git-fixes).\n- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).\n- blk-tag: Hide spin_lock (bsc#1193787).\n- block: avoid double io accounting for flush request (bsc#1193787).\n- block: do not send a rezise udev event for hidden block device (bsc#1193096).\n- block: mark flush request as IDLE when it is really finished (bsc#1193787).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Adjust BTF log size limit (git-fixes).\n- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).\n- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).\n- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).\n- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).\n- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).\n- btrfs: only clamp the first time we have to start flushing (bsc#1196195).\n- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).\n- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).\n- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).\n- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).\n- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).\n- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).\n- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Recover from queue stall due to missed IRQ (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- i40iw: Add support to make destroy QP synchronous (git-fixes)\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- integrity: Make function integrity_add_key() static (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- integrity: double check iint_cache was initialized (git-fixes).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).\n- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).\n- kABI: Fix kABI for AMD IOMMU driver (git-fixes).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- md/raid5: fix oops during stripe resizing (bsc#1181588).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- nfp: flower: fix ida_idx not being released (bsc#1154353).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).\n- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).\n- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).\n- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).\n- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).\n- nvme-multipath: fix ANA state updates when a namespace is not present (git-fixes).\n- nvme-tcp: fix data digest pointer calculation (git-fixes).\n- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).\n- nvme-tcp: fix memory leak when freeing a queue (git-fixes).\n- nvme-tcp: fix possible use-after-completion (git-fixes).\n- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).\n- nvme: introduce a nvme_host_path_error helper (git-fixes).\n- nvme: let namespace probing continue for unsupported features (git-fixes).\n- nvme: refactor ns-\u003ectrl by request (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).\n- s390/bpf: Fix optimizing out zero-extensions (git-fixes).\n- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).\n- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).\n- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).\n- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).\n- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).\n- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).\n- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).\n- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).\n- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).\n- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).\n- scsi: core: Add limitless cmd retry support (bsc#1195506).\n- scsi: core: No retries on abort success (bsc#1195506).\n- scsi: kABI fix for \u0027eh_should_retry_cmd\u0027 (bsc#1195506).\n- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).\n- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).\n- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).\n- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).\n- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).\n- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).\n- staging/fbtft: Fix backlight (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- tty: Add support for Brainboxes UC cards (git-fixes).\n- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).\n- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).\n- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: s3c: remove unused \u0027udc\u0027 variable (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-755", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0755-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0755-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0755-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176940", "url": "https://bugzilla.suse.com/1176940" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1181588", "url": "https://bugzilla.suse.com/1181588" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188404", "url": "https://bugzilla.suse.com/1188404" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1190972", "url": "https://bugzilla.suse.com/1190972" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1191741", "url": "https://bugzilla.suse.com/1191741" }, { "category": "self", "summary": "SUSE Bug 1192210", "url": "https://bugzilla.suse.com/1192210" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193233", "url": "https://bugzilla.suse.com/1193233" }, { "category": "self", "summary": "SUSE Bug 1193243", "url": "https://bugzilla.suse.com/1193243" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194967", "url": "https://bugzilla.suse.com/1194967" }, { "category": "self", "summary": "SUSE Bug 1195012", "url": "https://bugzilla.suse.com/1195012" }, { "category": "self", "summary": "SUSE Bug 1195081", "url": "https://bugzilla.suse.com/1195081" }, { "category": "self", "summary": "SUSE Bug 1195142", "url": "https://bugzilla.suse.com/1195142" }, { "category": "self", "summary": "SUSE Bug 1195352", "url": "https://bugzilla.suse.com/1195352" }, { "category": "self", "summary": "SUSE Bug 1195378", "url": "https://bugzilla.suse.com/1195378" }, { "category": "self", "summary": "SUSE Bug 1195476", "url": "https://bugzilla.suse.com/1195476" }, { "category": "self", "summary": "SUSE Bug 1195477", "url": "https://bugzilla.suse.com/1195477" }, { "category": "self", "summary": "SUSE Bug 1195478", "url": "https://bugzilla.suse.com/1195478" }, { "category": "self", "summary": "SUSE Bug 1195479", "url": "https://bugzilla.suse.com/1195479" }, { "category": "self", "summary": "SUSE Bug 1195480", "url": "https://bugzilla.suse.com/1195480" }, { "category": "self", "summary": "SUSE Bug 1195481", "url": "https://bugzilla.suse.com/1195481" }, { "category": "self", "summary": "SUSE Bug 1195482", "url": "https://bugzilla.suse.com/1195482" }, { "category": "self", "summary": "SUSE Bug 1195506", "url": "https://bugzilla.suse.com/1195506" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195798", "url": "https://bugzilla.suse.com/1195798" }, { "category": "self", "summary": "SUSE Bug 1195799", "url": "https://bugzilla.suse.com/1195799" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195928", "url": "https://bugzilla.suse.com/1195928" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196195", "url": "https://bugzilla.suse.com/1196195" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196403", "url": "https://bugzilla.suse.com/1196403" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:02:41Z", "generator": { "date": "2022-03-08T18:02:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0755-1", "initial_release_date": "2022-03-08T18:02:41Z", "revision_history": [ { "date": "2022-03-08T18:02:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "product_id": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-150300.38.47.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-150300.38.47.1.noarch", "product_id": "kernel-source-azure-5.3.18-150300.38.47.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-150300.38.47.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-150300.38.47.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:41Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:41Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:41Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:41Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:41Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:41Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
opensuse-su-2022:0760-1
Vulnerability from csaf_opensuse
Published
2022-03-08 18:06
Modified
2022-03-08 18:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
The following non-security bugs were fixed:
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- KVM: remember position in kvm->vcpus array (bsc#1190972 LTC#194674).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags->rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags->rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq->refcount before calling ->fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
Patchnames
openSUSE-SLE-15.3-2022-760,openSUSE-SLE-15.4-2022-760
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ASoC: Revert \u0027ASoC: mediatek: Check for error clk pointer\u0027 (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).\n- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)\n- EDAC/xgene: Fix deferred probing (bsc#1178134).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).\n- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).\n- KVM: remember position in kvm-\u003evcpus array (bsc#1190972 LTC#194674).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).\n- RDMA/core: Always release restrack object (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/siw: Release xarray entry (git-fixes)\n- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).\n- blk-mq: avoid to iterate over stale request (bsc#1193787).\n- blk-mq: clear stale request in tags-\u003erq before freeing one request pool (bsc#1193787).\n- blk-mq: clearing flush request reference in tags-\u003erqs (bsc#1193787).\n- blk-mq: do not grab rq\u0027s refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).\n- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).\n- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).\n- blk-mq: grab rq-\u003erefcount before calling -\u003efn in blk_mq_tagset_busy_iter (bsc#1193787).\n- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).\n- blk-tag: Hide spin_lock (bsc#1193787).\n- block: avoid double io accounting for flush request (bsc#1193787).\n- block: do not send a rezise udev event for hidden block device (bsc#1193096).\n- block: mark flush request as IDLE when it is really finished (bsc#1193787).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Adjust BTF log size limit (git-fixes).\n- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).\n- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).\n- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).\n- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).\n- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).\n- btrfs: only clamp the first time we have to start flushing (bsc#1196195).\n- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).\n- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).\n- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).\n- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).\n- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).\n- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Recover from queue stall due to missed IRQ (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- integrity: Make function integrity_add_key() static (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- integrity: double check iint_cache was initialized (git-fixes).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).\n- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).\n- kABI: Fix kABI for AMD IOMMU driver (git-fixes).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- md/raid5: fix oops during stripe resizing (bsc#1181588).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- nfp: flower: fix ida_idx not being released (bsc#1154353).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: let namespace probing continue for unsupported features (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).\n- s390/bpf: Fix optimizing out zero-extensions (git-fixes).\n- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).\n- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).\n- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).\n- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).\n- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).\n- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).\n- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).\n- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).\n- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).\n- scsi: core: Add limitless cmd retry support (bsc#1195506).\n- scsi: core: No retries on abort success (bsc#1195506).\n- scsi: kABI fix for \u0027eh_should_retry_cmd\u0027 (bsc#1195506).\n- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).\n- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).\n- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).\n- staging/fbtft: Fix backlight (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: s3c: remove unused \u0027udc\u0027 variable (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-760,openSUSE-SLE-15.4-2022-760", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0760-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0760-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0760-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176940", "url": "https://bugzilla.suse.com/1176940" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1181588", "url": "https://bugzilla.suse.com/1181588" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188404", "url": "https://bugzilla.suse.com/1188404" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1190972", "url": "https://bugzilla.suse.com/1190972" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1191741", "url": "https://bugzilla.suse.com/1191741" }, { "category": "self", "summary": "SUSE Bug 1192210", "url": "https://bugzilla.suse.com/1192210" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193233", "url": "https://bugzilla.suse.com/1193233" }, { "category": "self", "summary": "SUSE Bug 1193243", "url": "https://bugzilla.suse.com/1193243" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194967", "url": "https://bugzilla.suse.com/1194967" }, { "category": "self", "summary": "SUSE Bug 1195012", "url": "https://bugzilla.suse.com/1195012" }, { "category": "self", "summary": "SUSE Bug 1195081", "url": "https://bugzilla.suse.com/1195081" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195352", "url": "https://bugzilla.suse.com/1195352" }, { "category": "self", "summary": "SUSE Bug 1195378", "url": "https://bugzilla.suse.com/1195378" }, { "category": "self", "summary": "SUSE Bug 1195506", "url": "https://bugzilla.suse.com/1195506" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195798", "url": "https://bugzilla.suse.com/1195798" }, { "category": "self", "summary": "SUSE Bug 1195799", "url": "https://bugzilla.suse.com/1195799" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195928", "url": "https://bugzilla.suse.com/1195928" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196195", "url": "https://bugzilla.suse.com/1196195" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196373", "url": "https://bugzilla.suse.com/1196373" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196403", "url": "https://bugzilla.suse.com/1196403" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196585", "url": "https://bugzilla.suse.com/1196585" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:06:58Z", "generator": { "date": "2022-03-08T18:06:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0760-1", "initial_release_date": "2022-03-08T18:06:58Z", "revision_history": [ { "date": "2022-03-08T18:06:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-al-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-al-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-altera-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-amd-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-apm-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-arm-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-cavium-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-exynos-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-freescale-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-lg-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-marvell-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-qcom-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-renesas-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-socionext-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-sprd-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-zte-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-syms-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-devel-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-devel-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-docs-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-docs-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-docs-html-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-macros-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-macros-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-source-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-source-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-syms-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-syms-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-syms-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-al-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-al-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.54.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.54.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.54.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.54.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:58Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:58Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:58Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:58Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:58Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:58Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
opensuse-su-2022:0768-1
Vulnerability from csaf_opensuse
Published
2022-03-09 09:09
Modified
2022-03-09 09:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
openSUSE-SLE-15.3-2022-768,openSUSE-SLE-15.4-2022-768
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\n\nThe following non-security bugs were fixed:\n\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-768,openSUSE-SLE-15.4-2022-768", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0768-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0768-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0768-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T09:09:29Z", "generator": { "date": "2022-03-09T09:09:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0768-1", "initial_release_date": "2022-03-09T09:09:29Z", "revision_history": [ { "date": "2022-03-09T09:09:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-man-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.108.1.s390x", "product_id": "kernel-default-man-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-197.108.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.108.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.108.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-197.108.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-vanilla-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-197.108.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-vanilla-4.12.14-197.108.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-197.108.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.108.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:09:29Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:1012-1
Vulnerability from csaf_suse
Published
2022-03-29 10:29
Modified
2022-03-29 10:29
Summary
Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.
The following security issues were fixed:
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
Patchnames
SUSE-2022-1012,SUSE-SLE-Live-Patching-12-SP4-2022-1004,SUSE-SLE-Live-Patching-12-SP4-2022-1005,SUSE-SLE-Live-Patching-12-SP4-2022-1006,SUSE-SLE-Live-Patching-12-SP4-2022-1007,SUSE-SLE-Live-Patching-12-SP5-2022-1009,SUSE-SLE-Live-Patching-12-SP5-2022-963,SUSE-SLE-Live-Patching-12-SP5-2022-964,SUSE-SLE-Live-Patching-12-SP5-2022-965,SUSE-SLE-Live-Patching-12-SP5-2022-966,SUSE-SLE-Live-Patching-12-SP5-2022-967,SUSE-SLE-Live-Patching-12-SP5-2022-968,SUSE-SLE-Live-Patching-12-SP5-2022-969,SUSE-SLE-Live-Patching-12-SP5-2022-970,SUSE-SLE-Live-Patching-12-SP5-2022-971,SUSE-SLE-Live-Patching-12-SP5-2022-972,SUSE-SLE-Module-Live-Patching-15-2022-974,SUSE-SLE-Module-Live-Patching-15-2022-975,SUSE-SLE-Module-Live-Patching-15-2022-997,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1010,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1011,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1012,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1013,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1022,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1030,SUSE-SLE-Module-Live-Patching-15-SP2-2022-988,SUSE-SLE-Module-Live-Patching-15-SP2-2022-989,SUSE-SLE-SAP-12-SP3-2022-1000,SUSE-SLE-SAP-12-SP3-2022-1001,SUSE-SLE-SAP-12-SP3-2022-1002,SUSE-SLE-SERVER-12-SP3-2022-1000,SUSE-SLE-SERVER-12-SP3-2022-1001,SUSE-SLE-SERVER-12-SP3-2022-1002
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.180-94_150 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1012,SUSE-SLE-Live-Patching-12-SP4-2022-1004,SUSE-SLE-Live-Patching-12-SP4-2022-1005,SUSE-SLE-Live-Patching-12-SP4-2022-1006,SUSE-SLE-Live-Patching-12-SP4-2022-1007,SUSE-SLE-Live-Patching-12-SP5-2022-1009,SUSE-SLE-Live-Patching-12-SP5-2022-963,SUSE-SLE-Live-Patching-12-SP5-2022-964,SUSE-SLE-Live-Patching-12-SP5-2022-965,SUSE-SLE-Live-Patching-12-SP5-2022-966,SUSE-SLE-Live-Patching-12-SP5-2022-967,SUSE-SLE-Live-Patching-12-SP5-2022-968,SUSE-SLE-Live-Patching-12-SP5-2022-969,SUSE-SLE-Live-Patching-12-SP5-2022-970,SUSE-SLE-Live-Patching-12-SP5-2022-971,SUSE-SLE-Live-Patching-12-SP5-2022-972,SUSE-SLE-Module-Live-Patching-15-2022-974,SUSE-SLE-Module-Live-Patching-15-2022-975,SUSE-SLE-Module-Live-Patching-15-2022-997,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1010,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1011,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1012,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1013,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1022,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1030,SUSE-SLE-Module-Live-Patching-15-SP2-2022-988,SUSE-SLE-Module-Live-Patching-15-SP2-2022-989,SUSE-SLE-SAP-12-SP3-2022-1000,SUSE-SLE-SAP-12-SP3-2022-1001,SUSE-SLE-SAP-12-SP3-2022-1002,SUSE-SLE-SERVER-12-SP3-2022-1000,SUSE-SLE-SERVER-12-SP3-2022-1001,SUSE-SLE-SERVER-12-SP3-2022-1002", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1012-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1012-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221012-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1012-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" } ], "title": "Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3)", "tracking": { "current_release_date": "2022-03-29T10:29:04Z", "generator": { "date": "2022-03-29T10:29:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1012-1", "initial_release_date": "2022-03-29T10:29:04Z", "revision_history": [ { "date": "2022-03-29T10:29:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T10:29:04Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-12-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-14-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-13-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_91-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-5-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-13-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-12-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-10-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-13-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-11-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-13-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-10-150000.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-5-150000.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-13-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T10:29:04Z", "details": "moderate" } ], "title": "CVE-2022-0492" } ] }
suse-su-2022:1038-1
Vulnerability from csaf_suse
Published
2022-03-30 07:37
Modified
2022-03-30 07:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index was not validated and could have been manipulated by the host for out-of-array access (bsc#1197245).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
The following non-security bugs were fixed:
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- constraints: Also adjust disk requirement for x86 and s390.
- constraints: Increase disk space for aarch64
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278).
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- README.BRANCH: Add Frederic Weisbecker as branch maintainer
- README.BRANCH: Remove Davidlohr Bueso as a branch maintainer
- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.
- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
SUSE-2022-1038,SUSE-SLE-Module-RT-15-SP3-2022-1038,SUSE-SUSE-MicroOS-5.1-2022-1038
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-\u003ebuf release (bsc#1195905).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index was not validated and could have been manipulated by the host for out-of-array access (bsc#1197245).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n\nThe following non-security bugs were fixed:\n\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- can: gs_usb: change active_channels\u0027s type from atomic_t to u8 (git-fixes).\n- cgroup/cpuset: Fix \u0027suspicious RCU usage\u0027 lockdep warning (bsc#1196868).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- constraints: Also adjust disk requirement for x86 and s390.\n- constraints: Increase disk space for aarch64\n- cpufreq: schedutil: Use kobject release() method to free (git-fixes)\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).\n- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).\n- drm/i915: Nuke not needed members of dram_info (bsc#1195211).\n- drm/i915: Remove memory frequency calculation (bsc#1195211).\n- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- EDAC/altera: Fix deferred probing (bsc#1178134).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).\n- efivars: Respect \u0027block\u0027 flag in efivar_entry_set_safe() (git-fixes).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix incorrect loading of i_blocks for large files (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gtp: remove useless rcu_read_lock() (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- Hand over the maintainership to SLE15-SP3 maintainers\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- iavf: Fix missing check for running netdev (git-fixes).\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).\n- IB/hfi1: Fix early init panic (git-fixes).\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- ice: initialize local variable \u0027tlv\u0027 (jsc#SLE-12878).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP \u0026 AIN_BUFM bits (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- mac80211: fix forwarded mesh frames AC \u0026 queue selection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mask out added spinlock in rndis_params (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).\n- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).\n- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).\n- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net/mlx5e: Fix modify header actions memory leak (git-fixes).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).\n- netsec: ignore \u0027phy-mode\u0027 device property on ACPI systems (git-fixes).\n- net: sfc: Replace in_interrupt() usage (git-fixes).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).\n- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278).\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).\n- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).\n- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).\n- RDMA/bnxt_re: Scan the whole bitmap when checking if \u0027disabling RCFW with pending cmd-bit\u0027 (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).\n- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).\n- RDMA/core: Do not infoleak GRH fields (git-fixes).\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).\n- RDMA/hns: Validate the pkey index (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).\n- RDMA/rxe: Fix a typo in opcode name (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).\n- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).\n- README.BRANCH: Add Frederic Weisbecker as branch maintainer\n- README.BRANCH: Remove Davidlohr Bueso as a branch maintainer\n- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.\n- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.\n- sched/core: Mitigate race (git-fixes)\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: smartpqi: Add PCI IDs (bsc#1196627).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).\n- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).\n- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).\n- usb: dwc2: use well defined macros for power_down (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- USB: gadget: validate endpoint index for xilinx udc (git-fixes).\n- USB: gadget: validate interface OS descriptor requests (git-fixes).\n- usb: host: xen-hcd: add missing unlock in error path (git-fixes).\n- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).\n- usb: hub: Fix locking issues with address0_mutex (git-fixes).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1038,SUSE-SLE-Module-RT-15-SP3-2022-1038,SUSE-SUSE-MicroOS-5.1-2022-1038", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1038-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1038-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1038-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176774", "url": "https://bugzilla.suse.com/1176774" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1179439", "url": "https://bugzilla.suse.com/1179439" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1191428", "url": "https://bugzilla.suse.com/1191428" }, { "category": "self", "summary": "SUSE Bug 1192273", "url": "https://bugzilla.suse.com/1192273" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1194943", "url": "https://bugzilla.suse.com/1194943" }, { "category": "self", "summary": "SUSE Bug 1195051", "url": "https://bugzilla.suse.com/1195051" }, { "category": "self", "summary": "SUSE Bug 1195211", "url": "https://bugzilla.suse.com/1195211" }, { "category": "self", "summary": "SUSE Bug 1195353", "url": "https://bugzilla.suse.com/1195353" }, { "category": "self", "summary": "SUSE Bug 1195403", "url": "https://bugzilla.suse.com/1195403" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196095", "url": "https://bugzilla.suse.com/1196095" }, { "category": "self", "summary": "SUSE Bug 1196130", "url": "https://bugzilla.suse.com/1196130" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196299", "url": "https://bugzilla.suse.com/1196299" }, { "category": "self", "summary": "SUSE Bug 1196301", "url": "https://bugzilla.suse.com/1196301" }, { "category": "self", "summary": "SUSE Bug 1196403", "url": "https://bugzilla.suse.com/1196403" }, { "category": "self", "summary": "SUSE Bug 1196468", "url": "https://bugzilla.suse.com/1196468" }, { "category": "self", "summary": "SUSE Bug 1196472", "url": "https://bugzilla.suse.com/1196472" }, { "category": "self", "summary": "SUSE Bug 1196488", "url": "https://bugzilla.suse.com/1196488" }, { "category": "self", "summary": "SUSE Bug 1196627", "url": "https://bugzilla.suse.com/1196627" }, { "category": "self", "summary": "SUSE Bug 1196723", "url": "https://bugzilla.suse.com/1196723" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE Bug 1196779", "url": "https://bugzilla.suse.com/1196779" }, { "category": "self", "summary": "SUSE Bug 1196830", "url": "https://bugzilla.suse.com/1196830" }, { "category": "self", "summary": "SUSE Bug 1196866", "url": "https://bugzilla.suse.com/1196866" }, { "category": "self", "summary": "SUSE Bug 1196868", "url": "https://bugzilla.suse.com/1196868" }, { "category": "self", "summary": "SUSE Bug 1197300", "url": "https://bugzilla.suse.com/1197300" }, { "category": "self", "summary": "SUSE Bug 922815", "url": "https://bugzilla.suse.com/922815" }, { "category": "self", "summary": "SUSE Bug 998635", "url": "https://bugzilla.suse.com/998635" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0920 page", "url": "https://www.suse.com/security/cve/CVE-2021-0920/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39698 page", "url": "https://www.suse.com/security/cve/CVE-2021-39698/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45402 page", "url": "https://www.suse.com/security/cve/CVE-2021-45402/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23036 page", "url": "https://www.suse.com/security/cve/CVE-2022-23036/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23037 page", "url": "https://www.suse.com/security/cve/CVE-2022-23037/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23038 page", "url": "https://www.suse.com/security/cve/CVE-2022-23038/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23039 page", "url": "https://www.suse.com/security/cve/CVE-2022-23039/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23040 page", "url": "https://www.suse.com/security/cve/CVE-2022-23040/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23041 page", "url": "https://www.suse.com/security/cve/CVE-2022-23041/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23042 page", "url": "https://www.suse.com/security/cve/CVE-2022-23042/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25258 page", "url": "https://www.suse.com/security/cve/CVE-2022-25258/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25636 page", "url": "https://www.suse.com/security/cve/CVE-2022-25636/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26966 page", "url": "https://www.suse.com/security/cve/CVE-2022-26966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-27223 page", "url": "https://www.suse.com/security/cve/CVE-2022-27223/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-30T07:37:14Z", "generator": { "date": "2022-03-30T07:37:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1038-1", "initial_release_date": "2022-03-30T07:37:14Z", "revision_history": [ { "date": "2022-03-30T07:37:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.82.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.82.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.82.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.82.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.82.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.82.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.82.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.82.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.82.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.82.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.82.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.82.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.82.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.82.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP3", "product": { "name": "SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-150300.82.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-150300.82.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.82.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.82.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0920" } ], "notes": [ { "category": "general", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0920", "url": "https://www.suse.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "SUSE Bug 1193731 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1193731" }, { "category": "external", "summary": "SUSE Bug 1194463 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1194463" }, { "category": "external", "summary": "SUSE Bug 1195939 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1195939" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2021-39698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39698" } ], "notes": [ { "category": "general", "text": "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39698", "url": "https://www.suse.com/security/cve/CVE-2021-39698" }, { "category": "external", "summary": "SUSE Bug 1196956 for CVE-2021-39698", "url": "https://bugzilla.suse.com/1196956" }, { "category": "external", "summary": "SUSE Bug 1196959 for CVE-2021-39698", "url": "https://bugzilla.suse.com/1196959" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2021-39698", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2021-39698" }, { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45402", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45402" } ], "notes": [ { "category": "general", "text": "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45402", "url": "https://www.suse.com/security/cve/CVE-2021-45402" }, { "category": "external", "summary": "SUSE Bug 1196130 for CVE-2021-45402", "url": "https://bugzilla.suse.com/1196130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2021-45402" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-23036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23036" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23036", "url": "https://www.suse.com/security/cve/CVE-2022-23036" }, { "category": "external", "summary": "SUSE Bug 1196488 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1196488" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23036" }, { "cve": "CVE-2022-23037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23037" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23037", "url": "https://www.suse.com/security/cve/CVE-2022-23037" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23037" }, { "cve": "CVE-2022-23038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23038" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23038", "url": "https://www.suse.com/security/cve/CVE-2022-23038" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23038" }, { "cve": "CVE-2022-23039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23039" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23039", "url": "https://www.suse.com/security/cve/CVE-2022-23039" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23039" }, { "cve": "CVE-2022-23040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23040" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23040", "url": "https://www.suse.com/security/cve/CVE-2022-23040" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23040" }, { "cve": "CVE-2022-23041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23041" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23041", "url": "https://www.suse.com/security/cve/CVE-2022-23041" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23041" }, { "cve": "CVE-2022-23042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23042" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23042", "url": "https://www.suse.com/security/cve/CVE-2022-23042" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-23042" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-24959" }, { "cve": "CVE-2022-25258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25258" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25258", "url": "https://www.suse.com/security/cve/CVE-2022-25258" }, { "category": "external", "summary": "SUSE Bug 1196095 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196095" }, { "category": "external", "summary": "SUSE Bug 1196132 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-25258" }, { "cve": "CVE-2022-25636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25636" } ], "notes": [ { "category": "general", "text": "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25636", "url": "https://www.suse.com/security/cve/CVE-2022-25636" }, { "category": "external", "summary": "SUSE Bug 1196299 for CVE-2022-25636", "url": "https://bugzilla.suse.com/1196299" }, { "category": "external", "summary": "SUSE Bug 1196301 for CVE-2022-25636", "url": "https://bugzilla.suse.com/1196301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-25636" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-26966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26966", "url": "https://www.suse.com/security/cve/CVE-2022-26966" }, { "category": "external", "summary": "SUSE Bug 1196836 for CVE-2022-26966", "url": "https://bugzilla.suse.com/1196836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-26966" }, { "cve": "CVE-2022-27223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-27223" } ], "notes": [ { "category": "general", "text": "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-27223", "url": "https://www.suse.com/security/cve/CVE-2022-27223" }, { "category": "external", "summary": "SUSE Bug 1197245 for CVE-2022-27223", "url": "https://bugzilla.suse.com/1197245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-30T07:37:14Z", "details": "moderate" } ], "title": "CVE-2022-27223" } ] }
suse-su-2022:0978-1
Vulnerability from csaf_suse
Published
2022-03-29 09:39
Modified
2022-03-29 09:39
Summary
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-59_16 fixes several issues.
The following security issues were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen (bsc#1192990).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
Patchnames
SUSE-2022-978,SUSE-SLE-Module-Live-Patching-15-SP3-2022-976,SUSE-SLE-Module-Live-Patching-15-SP3-2022-977,SUSE-SLE-Module-Live-Patching-15-SP3-2022-978,SUSE-SLE-Module-Live-Patching-15-SP3-2022-979,SUSE-SLE-Module-Live-Patching-15-SP3-2022-981
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-59_16 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen (bsc#1192990).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-978,SUSE-SLE-Module-Live-Patching-15-SP3-2022-976,SUSE-SLE-Module-Live-Patching-15-SP3-2022-977,SUSE-SLE-Module-Live-Patching-15-SP3-2022-978,SUSE-SLE-Module-Live-Patching-15-SP3-2022-979,SUSE-SLE-Module-Live-Patching-15-SP3-2022-981", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0978-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0978-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220978-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0978-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" }, { "category": "self", "summary": "SUSE Bug 1192991", "url": "https://bugzilla.suse.com/1192991" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1196301", "url": "https://bugzilla.suse.com/1196301" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4001 page", "url": "https://www.suse.com/security/cve/CVE-2021-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25636 page", "url": "https://www.suse.com/security/cve/CVE-2022-25636/" } ], "title": "Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-03-29T09:39:29Z", "generator": { "date": "2022-03-29T09:39:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0978-1", "initial_release_date": "2022-03-29T09:39:29Z", "revision_history": [ { "date": "2022-03-29T09:39:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "product_id": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-preempt-13-150200.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-57-preempt-13-150200.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-57-preempt-13-150200.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4001" } ], "notes": [ { "category": "general", "text": "A race condition was found in the Linux kernel\u0027s ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4001", "url": "https://www.suse.com/security/cve/CVE-2021-4001" }, { "category": "external", "summary": "SUSE Bug 1192990 for CVE-2021-4001", "url": "https://bugzilla.suse.com/1192990" }, { "category": "external", "summary": "SUSE Bug 1192991 for CVE-2021-4001", "url": "https://bugzilla.suse.com/1192991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:29Z", "details": "important" } ], "title": "CVE-2021-4001" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:29Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:29Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-25636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25636" } ], "notes": [ { "category": "general", "text": "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25636", "url": "https://www.suse.com/security/cve/CVE-2022-25636" }, { "category": "external", "summary": "SUSE Bug 1196299 for CVE-2022-25636", "url": "https://bugzilla.suse.com/1196299" }, { "category": "external", "summary": "SUSE Bug 1196301 for CVE-2022-25636", "url": "https://bugzilla.suse.com/1196301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-13-150200.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-11-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-10-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-11-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:29Z", "details": "important" } ], "title": "CVE-2022-25636" } ] }
suse-su-2022:0759-1
Vulnerability from csaf_suse
Published
2022-03-08 18:06
Modified
2022-03-08 18:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
The following non-security bugs were fixed:
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
Patchnames
SUSE-2022-759,SUSE-SLE-Module-Live-Patching-15-SP2-2022-759,SUSE-SLE-Product-HA-15-SP2-2022-759,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-759,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-759,SUSE-SLE-Product-RT-15-SP2-2022-759,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-759,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-759,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-759,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-759,SUSE-SUSE-MicroOS-5.0-2022-759,SUSE-Storage-7-2022-759
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-\u003ebuf release (bsc#1195905).\n\nThe following non-security bugs were fixed:\n\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- gve: Add RX context (jsc#SLE-23652).\n- gve: Add a jumbo-frame device option (jsc#SLE-23652).\n- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).\n- gve: Correct order of processing device options (jsc#SLE-23652).\n- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).\n- gve: Implement packet continuation for RX (jsc#SLE-23652).\n- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).\n- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).\n- gve: Recording rx queue before sending to napi (jsc#SLE-23652).\n- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).\n- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).\n- gve: fix for null pointer dereference (jsc#SLE-23652).\n- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).\n- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).\n- gve: remove memory barrier around seqno (jsc#SLE-23652).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-759,SUSE-SLE-Module-Live-Patching-15-SP2-2022-759,SUSE-SLE-Product-HA-15-SP2-2022-759,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-759,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-759,SUSE-SLE-Product-RT-15-SP2-2022-759,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-759,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-759,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-759,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-759,SUSE-SUSE-MicroOS-5.0-2022-759,SUSE-Storage-7-2022-759", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0759-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0759-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220759-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0759-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195254", "url": "https://bugzilla.suse.com/1195254" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195905", "url": "https://bugzilla.suse.com/1195905" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196095", "url": "https://bugzilla.suse.com/1196095" }, { "category": "self", "summary": "SUSE Bug 1196132", "url": "https://bugzilla.suse.com/1196132" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25258 page", "url": "https://www.suse.com/security/cve/CVE-2022-25258/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:06:15Z", "generator": { "date": "2022-03-08T18:06:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0759-1", "initial_release_date": "2022-03-08T18:06:15Z", "revision_history": [ { "date": "2022-03-08T18:06:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-extra-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64", "product_id": "kernel-obs-build-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-syms-5.3.18-24.107.1.aarch64", "product_id": "kernel-syms-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.107.1.noarch", "product": { "name": "kernel-devel-5.3.18-24.107.1.noarch", "product_id": "kernel-devel-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.107.1.noarch", "product": { "name": "kernel-docs-5.3.18-24.107.1.noarch", "product_id": "kernel-docs-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.107.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.107.1.noarch", "product_id": "kernel-docs-html-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.107.1.noarch", "product": { "name": "kernel-macros-5.3.18-24.107.1.noarch", "product_id": "kernel-macros-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.107.1.noarch", "product": { "name": "kernel-source-5.3.18-24.107.1.noarch", "product_id": "kernel-source-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.107.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.107.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.107.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.107.1.ppc64le", "product_id": "kernel-debug-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le", "product_id": "kernel-syms-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.s390x", "product_id": "dlm-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-5.3.18-24.107.1.s390x", "product_id": "kernel-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.s390x", "product_id": "kernel-default-devel-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.s390x", "product_id": "kernel-default-extra-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.s390x", "product_id": "kernel-obs-build-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.s390x", "product_id": "kernel-obs-qa-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.s390x", "product": { "name": "kernel-syms-5.3.18-24.107.1.s390x", "product_id": "kernel-syms-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.107.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.107.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-debug-5.3.18-24.107.1.x86_64", "product_id": "kernel-debug-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-extra-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.107.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64", "product_id": "kernel-obs-build-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-syms-5.3.18-24.107.1.x86_64", "product_id": "kernel-syms-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP2", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.0", "product": { "name": "SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.0" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-syms-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-syms-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-24959" }, { "cve": "CVE-2022-25258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25258" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25258", "url": "https://www.suse.com/security/cve/CVE-2022-25258" }, { "category": "external", "summary": "SUSE Bug 1196095 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196095" }, { "category": "external", "summary": "SUSE Bug 1196132 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "important" } ], "title": "CVE-2022-25258" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
suse-su-2022:0760-1
Vulnerability from csaf_suse
Published
2022-03-08 18:07
Modified
2022-03-08 18:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
The following non-security bugs were fixed:
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- KVM: remember position in kvm->vcpus array (bsc#1190972 LTC#194674).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags->rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags->rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq->refcount before calling ->fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
Patchnames
SUSE-2022-760,SUSE-SLE-Module-Basesystem-15-SP3-2022-760,SUSE-SLE-Module-Development-Tools-15-SP3-2022-760,SUSE-SLE-Module-Legacy-15-SP3-2022-760,SUSE-SLE-Module-Live-Patching-15-SP3-2022-760,SUSE-SLE-Product-HA-15-SP3-2022-760,SUSE-SLE-Product-WE-15-SP3-2022-760,SUSE-SUSE-MicroOS-5.1-2022-760
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ASoC: Revert \u0027ASoC: mediatek: Check for error clk pointer\u0027 (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).\n- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)\n- EDAC/xgene: Fix deferred probing (bsc#1178134).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).\n- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).\n- KVM: remember position in kvm-\u003evcpus array (bsc#1190972 LTC#194674).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).\n- RDMA/core: Always release restrack object (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/siw: Release xarray entry (git-fixes)\n- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).\n- blk-mq: avoid to iterate over stale request (bsc#1193787).\n- blk-mq: clear stale request in tags-\u003erq before freeing one request pool (bsc#1193787).\n- blk-mq: clearing flush request reference in tags-\u003erqs (bsc#1193787).\n- blk-mq: do not grab rq\u0027s refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).\n- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).\n- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).\n- blk-mq: grab rq-\u003erefcount before calling -\u003efn in blk_mq_tagset_busy_iter (bsc#1193787).\n- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).\n- blk-tag: Hide spin_lock (bsc#1193787).\n- block: avoid double io accounting for flush request (bsc#1193787).\n- block: do not send a rezise udev event for hidden block device (bsc#1193096).\n- block: mark flush request as IDLE when it is really finished (bsc#1193787).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Adjust BTF log size limit (git-fixes).\n- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).\n- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).\n- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).\n- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).\n- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).\n- btrfs: only clamp the first time we have to start flushing (bsc#1196195).\n- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).\n- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).\n- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).\n- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).\n- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).\n- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Recover from queue stall due to missed IRQ (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- integrity: Make function integrity_add_key() static (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- integrity: double check iint_cache was initialized (git-fixes).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).\n- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).\n- kABI: Fix kABI for AMD IOMMU driver (git-fixes).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- md/raid5: fix oops during stripe resizing (bsc#1181588).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- nfp: flower: fix ida_idx not being released (bsc#1154353).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: let namespace probing continue for unsupported features (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).\n- s390/bpf: Fix optimizing out zero-extensions (git-fixes).\n- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).\n- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).\n- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).\n- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).\n- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).\n- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).\n- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).\n- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).\n- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).\n- scsi: core: Add limitless cmd retry support (bsc#1195506).\n- scsi: core: No retries on abort success (bsc#1195506).\n- scsi: kABI fix for \u0027eh_should_retry_cmd\u0027 (bsc#1195506).\n- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).\n- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).\n- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).\n- staging/fbtft: Fix backlight (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: s3c: remove unused \u0027udc\u0027 variable (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-760,SUSE-SLE-Module-Basesystem-15-SP3-2022-760,SUSE-SLE-Module-Development-Tools-15-SP3-2022-760,SUSE-SLE-Module-Legacy-15-SP3-2022-760,SUSE-SLE-Module-Live-Patching-15-SP3-2022-760,SUSE-SLE-Product-HA-15-SP3-2022-760,SUSE-SLE-Product-WE-15-SP3-2022-760,SUSE-SUSE-MicroOS-5.1-2022-760", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0760-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0760-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220760-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0760-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176940", "url": "https://bugzilla.suse.com/1176940" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1181588", "url": "https://bugzilla.suse.com/1181588" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188404", "url": "https://bugzilla.suse.com/1188404" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1190972", "url": "https://bugzilla.suse.com/1190972" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1191741", "url": "https://bugzilla.suse.com/1191741" }, { "category": "self", "summary": "SUSE Bug 1192210", "url": "https://bugzilla.suse.com/1192210" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193233", "url": "https://bugzilla.suse.com/1193233" }, { "category": "self", "summary": "SUSE Bug 1193243", "url": "https://bugzilla.suse.com/1193243" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194967", "url": "https://bugzilla.suse.com/1194967" }, { "category": "self", "summary": "SUSE Bug 1195012", "url": "https://bugzilla.suse.com/1195012" }, { "category": "self", "summary": "SUSE Bug 1195081", "url": "https://bugzilla.suse.com/1195081" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195352", "url": "https://bugzilla.suse.com/1195352" }, { "category": "self", "summary": "SUSE Bug 1195378", "url": "https://bugzilla.suse.com/1195378" }, { "category": "self", "summary": "SUSE Bug 1195506", "url": "https://bugzilla.suse.com/1195506" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195798", "url": "https://bugzilla.suse.com/1195798" }, { "category": "self", "summary": "SUSE Bug 1195799", "url": "https://bugzilla.suse.com/1195799" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195928", "url": "https://bugzilla.suse.com/1195928" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196195", "url": "https://bugzilla.suse.com/1196195" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196373", "url": "https://bugzilla.suse.com/1196373" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196403", "url": "https://bugzilla.suse.com/1196403" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196585", "url": "https://bugzilla.suse.com/1196585" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:07:32Z", "generator": { "date": "2022-03-08T18:07:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0760-1", "initial_release_date": "2022-03-08T18:07:32Z", "revision_history": [ { "date": "2022-03-08T18:07:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-al-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-al-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-altera-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-amd-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-apm-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-arm-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-cavium-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-exynos-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-freescale-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-lg-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-marvell-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-qcom-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-renesas-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-socionext-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-sprd-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-zte-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-syms-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-devel-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-devel-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-docs-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-docs-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-docs-html-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-macros-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-macros-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-source-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-source-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-syms-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-syms-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-preempt-1-150300.7.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-preempt-1-150300.7.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_54-preempt-1-150300.7.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-syms-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
suse-su-2022:0984-1
Vulnerability from csaf_suse
Published
2022-03-29 09:39
Modified
2022-03-29 09:39
Summary
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-59_37 fixes several issues.
The following security issues were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen (bsc#1192990).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
Patchnames
SUSE-2022-984,SUSE-SLE-Module-Live-Patching-15-SP3-2022-1016,SUSE-SLE-Module-Live-Patching-15-SP3-2022-980,SUSE-SLE-Module-Live-Patching-15-SP3-2022-982,SUSE-SLE-Module-Live-Patching-15-SP3-2022-983,SUSE-SLE-Module-Live-Patching-15-SP3-2022-984
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-59_37 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen (bsc#1192990).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-984,SUSE-SLE-Module-Live-Patching-15-SP3-2022-1016,SUSE-SLE-Module-Live-Patching-15-SP3-2022-980,SUSE-SLE-Module-Live-Patching-15-SP3-2022-982,SUSE-SLE-Module-Live-Patching-15-SP3-2022-983,SUSE-SLE-Module-Live-Patching-15-SP3-2022-984", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0984-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0984-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220984-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0984-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010553.html" }, { "category": "self", "summary": "SUSE Bug 1192991", "url": "https://bugzilla.suse.com/1192991" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1196301", "url": "https://bugzilla.suse.com/1196301" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4001 page", "url": "https://www.suse.com/security/cve/CVE-2021-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25636 page", "url": "https://www.suse.com/security/cve/CVE-2022-25636/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-03-29T09:39:53Z", "generator": { "date": "2022-03-29T09:39:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0984-1", "initial_release_date": "2022-03-29T09:39:53Z", "revision_history": [ { "date": "2022-03-29T09:39:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-preempt-5-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_37-preempt-5-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_37-preempt-5-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4001" } ], "notes": [ { "category": "general", "text": "A race condition was found in the Linux kernel\u0027s ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4001", "url": "https://www.suse.com/security/cve/CVE-2021-4001" }, { "category": "external", "summary": "SUSE Bug 1192990 for CVE-2021-4001", "url": "https://bugzilla.suse.com/1192990" }, { "category": "external", "summary": "SUSE Bug 1192991 for CVE-2021-4001", "url": "https://bugzilla.suse.com/1192991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:53Z", "details": "important" } ], "title": "CVE-2021-4001" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:53Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-25636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25636" } ], "notes": [ { "category": "general", "text": "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25636", "url": "https://www.suse.com/security/cve/CVE-2022-25636" }, { "category": "external", "summary": "SUSE Bug 1196299 for CVE-2022-25636", "url": "https://bugzilla.suse.com/1196299" }, { "category": "external", "summary": "SUSE Bug 1196301 for CVE-2022-25636", "url": "https://bugzilla.suse.com/1196301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-9-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-7-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-6-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-5-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:39:53Z", "details": "important" } ], "title": "CVE-2022-25636" } ] }
suse-su-2022:0991-1
Vulnerability from csaf_suse
Published
2022-03-29 09:42
Modified
2022-03-29 09:42
Summary
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_102 fixes one issue.
The following security issue was fixed:
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
Patchnames
SUSE-2022-991,SUSE-SLE-Live-Patching-12-SP4-2022-1008,SUSE-SLE-Live-Patching-12-SP5-2022-1017,SUSE-SLE-Module-Live-Patching-15-2022-973,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1014,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1015,SUSE-SLE-Module-Live-Patching-15-SP2-2022-987,SUSE-SLE-Module-Live-Patching-15-SP2-2022-990,SUSE-SLE-Module-Live-Patching-15-SP2-2022-991,SUSE-SLE-Module-Live-Patching-15-SP2-2022-992,SUSE-SLE-Module-Live-Patching-15-SP2-2022-993,SUSE-SLE-Module-Live-Patching-15-SP2-2022-994,SUSE-SLE-Module-Live-Patching-15-SP2-2022-995
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_102 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-991,SUSE-SLE-Live-Patching-12-SP4-2022-1008,SUSE-SLE-Live-Patching-12-SP5-2022-1017,SUSE-SLE-Module-Live-Patching-15-2022-973,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1014,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1015,SUSE-SLE-Module-Live-Patching-15-SP2-2022-987,SUSE-SLE-Module-Live-Patching-15-SP2-2022-990,SUSE-SLE-Module-Live-Patching-15-SP2-2022-991,SUSE-SLE-Module-Live-Patching-15-SP2-2022-992,SUSE-SLE-Module-Live-Patching-15-SP2-2022-993,SUSE-SLE-Module-Live-Patching-15-SP2-2022-994,SUSE-SLE-Module-Live-Patching-15-SP2-2022-995", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0991-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0991-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220991-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0991-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010554.html" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2)", "tracking": { "current_release_date": "2022-03-29T09:42:17Z", "generator": { "date": "2022-03-29T09:42:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0991-1", "initial_release_date": "2022-03-29T09:42:17Z", "revision_history": [ { "date": "2022-03-29T09:42:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_88-default-2-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_110-default-2-2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_86-preempt-7-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_86-preempt-7-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_86-preempt-7-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_88-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_110-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-2-150100.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-3-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-10-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-9-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_83-default-7-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_86-default-7-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_93-default-6-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-5-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-4-150200.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-2-150000.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-29T09:42:17Z", "details": "moderate" } ], "title": "CVE-2022-0492" } ] }
suse-su-2022:0768-1
Vulnerability from csaf_suse
Published
2022-03-09 09:10
Modified
2022-03-09 09:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
SUSE-2022-768,SUSE-SLE-Module-Live-Patching-15-SP1-2022-768,SUSE-SLE-Product-HA-15-SP1-2022-768,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-768,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-768,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-768,SUSE-Storage-6-2022-768
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\n\nThe following non-security bugs were fixed:\n\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-768,SUSE-SLE-Module-Live-Patching-15-SP1-2022-768,SUSE-SLE-Product-HA-15-SP1-2022-768,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-768,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-768,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-768,SUSE-Storage-6-2022-768", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0768-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0768-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220768-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0768-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T09:10:04Z", "generator": { "date": "2022-03-09T09:10:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0768-1", "initial_release_date": "2022-03-09T09:10:04Z", "revision_history": [ { "date": "2022-03-09T09:10:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.108.1.aarch64", "product_id": "kernel-syms-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.108.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.108.1.noarch", "product_id": "kernel-devel-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.108.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.108.1.noarch", "product_id": "kernel-docs-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.108.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.108.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.108.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.108.1.noarch", "product_id": "kernel-macros-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.108.1.noarch", "product": { "name": "kernel-source-4.12.14-197.108.1.noarch", "product_id": "kernel-source-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.108.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.108.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.108.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.108.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-4.12.14-197.108.1.s390x", "product_id": "kernel-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.108.1.s390x", "product_id": "kernel-default-base-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.108.1.s390x", "product_id": "kernel-default-man-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.108.1.s390x", "product_id": "kernel-syms-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.108.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.108.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.108.1.x86_64", "product_id": "kernel-syms-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0761-1
Vulnerability from csaf_suse
Published
2022-03-09 13:27
Modified
2022-03-09 13:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
The following non-security bugs were fixed:
- Bluetooth: bfusb: fix division by zero in send path (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1114648).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).
- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).
- RDMA/mlx5: Set user priority for DCT (bsc#1103991).
- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).
- ext4: avoid trim error on fs with small groups (bsc#1191271).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add netif_set_xps_queue call (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Add rx buffer pagecnt bias (bsc#1191655).
- gve: Allow pageflips on larger pages (bsc#1191655).
- gve: Avoid freeing NULL pointer (bsc#1191655).
- gve: Correct available tx qpl check (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: DQO: avoid unused variable warnings (bsc#1191655).
- gve: Do lazy cleanup in TX path (bsc#1191655).
- gve: Fix GFP flags when allocing pages (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Switch to use napi_complete_done (bsc#1191655).
- gve: Track RX buffer allocation failures (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix gve_get_stats() (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).
- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).
- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).
- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).
- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).
- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).
- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).
- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).
- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).
- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).
- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).
- iavf: prevent accidental free of filter structure (bsc#1111981 ).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: Delete always true check of PF pointer (bsc#1118661 ).
- ice: ignore dropped packets during init (bsc#1118661 ).
- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).
- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).
- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).
- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).
- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- phylib: fix potential use-after-free (bsc#1119113).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- rndis_host: support Hytera digital radios (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).
- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).
- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).
- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
Patchnames
SUSE-2022-761,SUSE-SLE-RT-12-SP5-2022-761
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: bfusb: fix division by zero in send path (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1114648).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).\n- RDMA/mlx5: Set user priority for DCT (bsc#1103991).\n- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add netif_set_xps_queue call (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Add rx buffer pagecnt bias (bsc#1191655).\n- gve: Allow pageflips on larger pages (bsc#1191655).\n- gve: Avoid freeing NULL pointer (bsc#1191655).\n- gve: Correct available tx qpl check (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: DQO: avoid unused variable warnings (bsc#1191655).\n- gve: Do lazy cleanup in TX path (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Switch to use napi_complete_done (bsc#1191655).\n- gve: Track RX buffer allocation failures (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix gve_get_stats() (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).\n- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).\n- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).\n- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).\n- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).\n- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).\n- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).\n- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).\n- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).\n- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).\n- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).\n- iavf: prevent accidental free of filter structure (bsc#1111981 ).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: Delete always true check of PF pointer (bsc#1118661 ).\n- ice: ignore dropped packets during init (bsc#1118661 ).\n- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).\n- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).\n- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).\n- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).\n- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).\n- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- phylib: fix potential use-after-free (bsc#1119113).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- rndis_host: support Hytera digital radios (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).\n- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).\n- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-761,SUSE-SLE-RT-12-SP5-2022-761", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0761-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0761-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220761-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0761-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1094978", "url": "https://bugzilla.suse.com/1094978" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111981", "url": "https://bugzilla.suse.com/1111981" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117495", "url": "https://bugzilla.suse.com/1117495" }, { "category": "self", "summary": "SUSE Bug 1118661", "url": "https://bugzilla.suse.com/1118661" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1158533", "url": "https://bugzilla.suse.com/1158533" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1191271", "url": "https://bugzilla.suse.com/1191271" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1193857", "url": "https://bugzilla.suse.com/1193857" }, { "category": "self", "summary": "SUSE Bug 1195080", "url": "https://bugzilla.suse.com/1195080" }, { "category": "self", "summary": "SUSE Bug 1195377", "url": "https://bugzilla.suse.com/1195377" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195638", "url": "https://bugzilla.suse.com/1195638" }, { "category": "self", "summary": "SUSE Bug 1195795", "url": "https://bugzilla.suse.com/1195795" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195934", "url": "https://bugzilla.suse.com/1195934" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T13:27:14Z", "generator": { "date": "2022-03-09T13:27:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0761-1", "initial_release_date": "2022-03-09T13:27:14Z", "revision_history": [ { "date": "2022-03-09T13:27:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.81.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.81.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.81.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.81.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.81.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.81.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-kgraft-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-kgraft-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.81.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.81.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.81.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.81.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.81.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0757-1
Vulnerability from csaf_suse
Published
2022-03-08 18:04
Modified
2022-03-08 18:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934).
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).
- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
SUSE-2022-757,SUSE-OpenStack-Cloud-9-2022-757,SUSE-OpenStack-Cloud-Crowbar-9-2022-757,SUSE-SLE-HA-12-SP4-2022-757,SUSE-SLE-Live-Patching-12-SP4-2022-757,SUSE-SLE-SAP-12-SP4-2022-757,SUSE-SLE-SERVER-12-SP4-LTSS-2022-757
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934).\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).\n- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-757,SUSE-OpenStack-Cloud-9-2022-757,SUSE-OpenStack-Cloud-Crowbar-9-2022-757,SUSE-SLE-HA-12-SP4-2022-757,SUSE-SLE-Live-Patching-12-SP4-2022-757,SUSE-SLE-SAP-12-SP4-2022-757,SUSE-SLE-SERVER-12-SP4-LTSS-2022-757", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0757-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0757-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220757-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0757-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" }, { "category": "self", "summary": "SUSE Bug 1107207", "url": "https://bugzilla.suse.com/1107207" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195934", "url": "https://bugzilla.suse.com/1195934" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:04:15Z", "generator": { "date": "2022-03-08T18:04:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0757-1", "initial_release_date": "2022-03-08T18:04:15Z", "revision_history": [ { "date": "2022-03-08T18:04:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.93.1.aarch64", "product_id": "kernel-syms-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.93.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.93.1.noarch", "product_id": "kernel-devel-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.93.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.93.1.noarch", "product_id": "kernel-docs-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.93.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.93.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.93.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.93.1.noarch", "product_id": "kernel-macros-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.93.1.noarch", "product": { "name": "kernel-source-4.12.14-95.93.1.noarch", "product_id": "kernel-source-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.93.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.93.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.93.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.93.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-4.12.14-95.93.1.s390x", "product_id": "kernel-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.93.1.s390x", "product_id": "kernel-default-base-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.93.1.s390x", "product_id": "kernel-default-man-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.93.1.s390x", "product_id": "kernel-syms-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.93.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.93.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.93.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.93.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "product_id": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.93.1.x86_64", "product_id": "kernel-syms-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0756-1
Vulnerability from csaf_suse
Published
2022-03-08 18:03
Modified
2022-03-08 18:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
The following non-security bug was fixed:
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
Patchnames
SUSE-2022-756,SUSE-SLE-SERVER-12-SP2-BCL-2022-756
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).\n- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).\n\nThe following non-security bug was fixed:\n\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-756,SUSE-SLE-SERVER-12-SP2-BCL-2022-756", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0756-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0756-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220756-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0756-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" }, { "category": "self", "summary": "SUSE Bug 1146312", "url": "https://bugzilla.suse.com/1146312" }, { "category": "self", "summary": "SUSE Bug 1190717", "url": "https://bugzilla.suse.com/1190717" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1193731", "url": "https://bugzilla.suse.com/1193731" }, { "category": "self", "summary": "SUSE Bug 1194463", "url": "https://bugzilla.suse.com/1194463" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195939", "url": "https://bugzilla.suse.com/1195939" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10905 page", "url": "https://www.suse.com/security/cve/CVE-2016-10905/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0920 page", "url": "https://www.suse.com/security/cve/CVE-2021-0920/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:03:12Z", "generator": { "date": "2022-03-08T18:03:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0756-1", "initial_release_date": "2022-03-08T18:03:12Z", "revision_history": [ { "date": "2022-03-08T18:03:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.169.1.aarch64", "product_id": "kernel-syms-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.169.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.169.1.noarch", "product_id": "kernel-devel-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.169.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.169.1.noarch", "product_id": "kernel-docs-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.169.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.169.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.169.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.169.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.169.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.169.1.noarch", "product_id": "kernel-macros-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.169.1.noarch", "product": { "name": "kernel-source-4.4.121-92.169.1.noarch", "product_id": "kernel-source-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.169.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.169.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.169.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.169.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-4.4.121-92.169.1.s390x", "product_id": "kernel-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.169.1.s390x", "product_id": "kernel-default-base-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.169.1.s390x", "product_id": "kernel-default-man-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.169.1.s390x", "product_id": "kernel-syms-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.169.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.169.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.169.1.x86_64", "product_id": "kernel-syms-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.169.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.169.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.169.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.169.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.169.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.169.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10905" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10905", "url": "https://www.suse.com/security/cve/CVE-2016-10905" }, { "category": "external", "summary": "SUSE Bug 1146312 for CVE-2016-10905", "url": "https://bugzilla.suse.com/1146312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2016-10905" }, { "cve": "CVE-2021-0920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0920" } ], "notes": [ { "category": "general", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0920", "url": "https://www.suse.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "SUSE Bug 1193731 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1193731" }, { "category": "external", "summary": "SUSE Bug 1194463 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1194463" }, { "category": "external", "summary": "SUSE Bug 1195939 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1195939" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "important" } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-24448" } ] }
suse-su-2022:0762-1
Vulnerability from csaf_suse
Published
2022-03-08 18:07
Modified
2022-03-08 18:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
Patchnames
HPE-Helion-OpenStack-8-2022-762,SUSE-2022-762,SUSE-OpenStack-Cloud-8-2022-762,SUSE-OpenStack-Cloud-Crowbar-8-2022-762,SUSE-SLE-HA-12-SP3-2022-762,SUSE-SLE-SAP-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-BCL-2022-762
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).\n- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2022-762,SUSE-2022-762,SUSE-OpenStack-Cloud-8-2022-762,SUSE-OpenStack-Cloud-Crowbar-8-2022-762,SUSE-SLE-HA-12-SP3-2022-762,SUSE-SLE-SAP-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-BCL-2022-762", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0762-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0762-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220762-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0762-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" }, { "category": "self", "summary": "SUSE Bug 1146312", "url": "https://bugzilla.suse.com/1146312" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1193731", "url": "https://bugzilla.suse.com/1193731" }, { "category": "self", "summary": "SUSE Bug 1194463", "url": "https://bugzilla.suse.com/1194463" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195939", "url": "https://bugzilla.suse.com/1195939" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10905 page", "url": "https://www.suse.com/security/cve/CVE-2016-10905/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0920 page", "url": "https://www.suse.com/security/cve/CVE-2021-0920/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:07:43Z", "generator": { "date": "2022-03-08T18:07:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0762-1", "initial_release_date": "2022-03-08T18:07:43Z", "revision_history": [ { "date": "2022-03-08T18:07:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.156.1.aarch64", "product_id": "kernel-syms-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.156.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.156.1.noarch", "product_id": "kernel-devel-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.156.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.156.1.noarch", "product_id": "kernel-macros-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.156.1.noarch", "product": { "name": "kernel-source-4.4.180-94.156.1.noarch", "product_id": "kernel-source-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.156.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.156.1.noarch", "product_id": "kernel-docs-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.156.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.156.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.156.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.156.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.156.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.156.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.156.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.156.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-4.4.180-94.156.1.s390x", "product_id": "kernel-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.156.1.s390x", "product_id": "kernel-default-base-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.156.1.s390x", "product_id": "kernel-default-man-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.156.1.s390x", "product_id": "kernel-syms-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.156.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.156.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.156.1.x86_64", "product_id": "kernel-syms-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10905" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10905", "url": "https://www.suse.com/security/cve/CVE-2016-10905" }, { "category": "external", "summary": "SUSE Bug 1146312 for CVE-2016-10905", "url": "https://bugzilla.suse.com/1146312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2016-10905" }, { "cve": "CVE-2021-0920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0920" } ], "notes": [ { "category": "general", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0920", "url": "https://www.suse.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "SUSE Bug 1193731 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1193731" }, { "category": "external", "summary": "SUSE Bug 1194463 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1194463" }, { "category": "external", "summary": "SUSE Bug 1195939 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1195939" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "important" } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-24448" } ] }
suse-su-2022:1257-1
Vulnerability from csaf_suse
Published
2022-04-19 09:03
Modified
2022-04-19 09:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space (bnc#1196823).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel (bnc#1198033).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation (bnc#1197702).
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation (bnc#1197462).
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed (bsc#1196956).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers (bsc#1196488).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image (bsc#1196079).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-28748: Fixed various information leaks that could be caused by malicious USB devices (bsc#1196018).
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c (bsc#1196761).
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution (bsc#1197227).
The following non-security bugs were fixed:
- cifs: use the correct max-length for dentry_path_raw() (bsc#1196196).
- gve: multiple bugfixes (jsc#SLE-23652).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
Patchnames
SUSE-2022-1257,SUSE-SLE-Module-RT-15-SP2-2022-1257,SUSE-SUSE-MicroOS-5.0-2022-1257
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space (bnc#1196823).\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel (bnc#1198033).\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).\n- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation (bnc#1197702).\n- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation (bnc#1197462).\n- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device (bsc#1196836).\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed (bsc#1196956).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers (bsc#1196488).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image (bsc#1196079).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-\u003ebuf release (bsc#1195905).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-28748: Fixed various information leaks that could be caused by malicious USB devices (bsc#1196018).\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155)\n- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c (bsc#1196761).\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution (bsc#1197227).\n\n\nThe following non-security bugs were fixed:\n\n- cifs: use the correct max-length for dentry_path_raw() (bsc#1196196).\n- gve: multiple bugfixes (jsc#SLE-23652).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1257,SUSE-SLE-Module-RT-15-SP2-2022-1257,SUSE-SUSE-MicroOS-5.0-2022-1257", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1257-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1257-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221257-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1257-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1189562", "url": "https://bugzilla.suse.com/1189562" }, { "category": "self", "summary": "SUSE Bug 1193731", "url": "https://bugzilla.suse.com/1193731" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1194943", "url": "https://bugzilla.suse.com/1194943" }, { "category": "self", "summary": "SUSE Bug 1195051", "url": "https://bugzilla.suse.com/1195051" }, { "category": "self", "summary": "SUSE Bug 1195254", "url": "https://bugzilla.suse.com/1195254" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195353", "url": "https://bugzilla.suse.com/1195353" }, { "category": "self", "summary": "SUSE Bug 1195403", "url": "https://bugzilla.suse.com/1195403" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195905", "url": "https://bugzilla.suse.com/1195905" }, { "category": "self", "summary": "SUSE Bug 1195939", "url": "https://bugzilla.suse.com/1195939" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196018", "url": "https://bugzilla.suse.com/1196018" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196095", "url": "https://bugzilla.suse.com/1196095" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196196", "url": "https://bugzilla.suse.com/1196196" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196468", "url": "https://bugzilla.suse.com/1196468" }, { "category": "self", "summary": "SUSE Bug 1196488", "url": "https://bugzilla.suse.com/1196488" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196761", "url": "https://bugzilla.suse.com/1196761" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE Bug 1196823", "url": "https://bugzilla.suse.com/1196823" }, { "category": "self", "summary": "SUSE Bug 1196830", "url": "https://bugzilla.suse.com/1196830" }, { "category": "self", "summary": "SUSE Bug 1196836", "url": "https://bugzilla.suse.com/1196836" }, { "category": "self", "summary": "SUSE Bug 1196956", "url": "https://bugzilla.suse.com/1196956" }, { "category": "self", "summary": "SUSE Bug 1197227", "url": "https://bugzilla.suse.com/1197227" }, { "category": "self", "summary": "SUSE Bug 1197331", "url": "https://bugzilla.suse.com/1197331" }, { "category": "self", "summary": "SUSE Bug 1197366", "url": "https://bugzilla.suse.com/1197366" }, { "category": "self", "summary": "SUSE Bug 1197389", "url": "https://bugzilla.suse.com/1197389" }, { "category": "self", "summary": "SUSE Bug 1197462", "url": "https://bugzilla.suse.com/1197462" }, { "category": "self", "summary": "SUSE Bug 1197702", "url": "https://bugzilla.suse.com/1197702" }, { "category": "self", "summary": "SUSE Bug 1198031", "url": "https://bugzilla.suse.com/1198031" }, { "category": "self", "summary": "SUSE Bug 1198032", "url": "https://bugzilla.suse.com/1198032" }, { "category": "self", "summary": "SUSE Bug 1198033", "url": "https://bugzilla.suse.com/1198033" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0920 page", "url": "https://www.suse.com/security/cve/CVE-2021-0920/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39698 page", "url": "https://www.suse.com/security/cve/CVE-2021-39698/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45868 page", "url": "https://www.suse.com/security/cve/CVE-2021-45868/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0850 page", "url": "https://www.suse.com/security/cve/CVE-2022-0850/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0854 page", "url": "https://www.suse.com/security/cve/CVE-2022-0854/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1016 page", "url": "https://www.suse.com/security/cve/CVE-2022-1016/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1048 page", "url": "https://www.suse.com/security/cve/CVE-2022-1048/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1055 page", "url": "https://www.suse.com/security/cve/CVE-2022-1055/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23036 page", "url": "https://www.suse.com/security/cve/CVE-2022-23036/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23037 page", "url": "https://www.suse.com/security/cve/CVE-2022-23037/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23038 page", "url": "https://www.suse.com/security/cve/CVE-2022-23038/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23039 page", "url": "https://www.suse.com/security/cve/CVE-2022-23039/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23040 page", "url": "https://www.suse.com/security/cve/CVE-2022-23040/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23041 page", "url": "https://www.suse.com/security/cve/CVE-2022-23041/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23042 page", "url": "https://www.suse.com/security/cve/CVE-2022-23042/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25258 page", "url": "https://www.suse.com/security/cve/CVE-2022-25258/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26966 page", "url": "https://www.suse.com/security/cve/CVE-2022-26966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-27666 page", "url": "https://www.suse.com/security/cve/CVE-2022-27666/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28748 page", "url": "https://www.suse.com/security/cve/CVE-2022-28748/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-04-19T09:03:30Z", "generator": { "date": "2022-04-19T09:03:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1257-1", "initial_release_date": "2022-04-19T09:03:30Z", "revision_history": [ { "date": "2022-04-19T09:03:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150200.79.2.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150200.79.2.noarch", "product_id": "kernel-devel-rt-5.3.18-150200.79.2.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150200.79.2.noarch", "product": { "name": "kernel-source-rt-5.3.18-150200.79.2.noarch", "product_id": "kernel-source-rt-5.3.18-150200.79.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt-devel-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt-extra-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt_debug-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150200.79.2.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150200.79.2.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150200.79.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150200.79.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150200.79.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150200.79.2.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150200.79.2.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150200.79.2.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150200.79.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150200.79.2.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150200.79.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP2", "product": { "name": "SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.0", "product": { "name": "SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-150200.79.2.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-150200.79.2.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64" }, "product_reference": "kernel-rt-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150200.79.2.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150200.79.2.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-150200.79.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-150200.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64" }, "product_reference": "kernel-rt-5.3.18-150200.79.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0920" } ], "notes": [ { "category": "general", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0920", "url": "https://www.suse.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "SUSE Bug 1193731 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1193731" }, { "category": "external", "summary": "SUSE Bug 1194463 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1194463" }, { "category": "external", "summary": "SUSE Bug 1195939 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1195939" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2021-39698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39698" } ], "notes": [ { "category": "general", "text": "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39698", "url": "https://www.suse.com/security/cve/CVE-2021-39698" }, { "category": "external", "summary": "SUSE Bug 1196956 for CVE-2021-39698", "url": "https://bugzilla.suse.com/1196956" }, { "category": "external", "summary": "SUSE Bug 1196959 for CVE-2021-39698", "url": "https://bugzilla.suse.com/1196959" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2021-39698", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2021-39698" }, { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45868" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45868", "url": "https://www.suse.com/security/cve/CVE-2021-45868" }, { "category": "external", "summary": "SUSE Bug 1197366 for CVE-2021-45868", "url": "https://bugzilla.suse.com/1197366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2021-45868" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0850" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0850", "url": "https://www.suse.com/security/cve/CVE-2022-0850" }, { "category": "external", "summary": "SUSE Bug 1196761 for CVE-2022-0850", "url": "https://bugzilla.suse.com/1196761" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-0850" }, { "cve": "CVE-2022-0854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0854" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel\u0027s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0854", "url": "https://www.suse.com/security/cve/CVE-2022-0854" }, { "category": "external", "summary": "SUSE Bug 1196823 for CVE-2022-0854", "url": "https://bugzilla.suse.com/1196823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-0854" }, { "cve": "CVE-2022-1016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1016", "url": "https://www.suse.com/security/cve/CVE-2022-1016" }, { "category": "external", "summary": "SUSE Bug 1197335 for CVE-2022-1016", "url": "https://bugzilla.suse.com/1197335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-1016" }, { "cve": "CVE-2022-1048", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1048" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1048", "url": "https://www.suse.com/security/cve/CVE-2022-1048" }, { "category": "external", "summary": "SUSE Bug 1197331 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1197331" }, { "category": "external", "summary": "SUSE Bug 1197597 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1197597" }, { "category": "external", "summary": "SUSE Bug 1200041 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1200041" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212325 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1212325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-1048" }, { "cve": "CVE-2022-1055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1055" } ], "notes": [ { "category": "general", "text": "A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1055", "url": "https://www.suse.com/security/cve/CVE-2022-1055" }, { "category": "external", "summary": "SUSE Bug 1197702 for CVE-2022-1055", "url": "https://bugzilla.suse.com/1197702" }, { "category": "external", "summary": "SUSE Bug 1197705 for CVE-2022-1055", "url": "https://bugzilla.suse.com/1197705" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-1055" }, { "cve": "CVE-2022-23036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23036" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23036", "url": "https://www.suse.com/security/cve/CVE-2022-23036" }, { "category": "external", "summary": "SUSE Bug 1196488 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1196488" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23036" }, { "cve": "CVE-2022-23037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23037" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23037", "url": "https://www.suse.com/security/cve/CVE-2022-23037" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23037" }, { "cve": "CVE-2022-23038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23038" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23038", "url": "https://www.suse.com/security/cve/CVE-2022-23038" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23038" }, { "cve": "CVE-2022-23039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23039" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23039", "url": "https://www.suse.com/security/cve/CVE-2022-23039" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23039" }, { "cve": "CVE-2022-23040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23040" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23040", "url": "https://www.suse.com/security/cve/CVE-2022-23040" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23040" }, { "cve": "CVE-2022-23041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23041" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23041", "url": "https://www.suse.com/security/cve/CVE-2022-23041" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23041" }, { "cve": "CVE-2022-23042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23042" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23042", "url": "https://www.suse.com/security/cve/CVE-2022-23042" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-23042" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-24959" }, { "cve": "CVE-2022-25258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25258" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25258", "url": "https://www.suse.com/security/cve/CVE-2022-25258" }, { "category": "external", "summary": "SUSE Bug 1196095 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196095" }, { "category": "external", "summary": "SUSE Bug 1196132 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-25258" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-25375" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-26966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26966", "url": "https://www.suse.com/security/cve/CVE-2022-26966" }, { "category": "external", "summary": "SUSE Bug 1196836 for CVE-2022-26966", "url": "https://bugzilla.suse.com/1196836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-26966" }, { "cve": "CVE-2022-27666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-27666" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-27666", "url": "https://www.suse.com/security/cve/CVE-2022-27666" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-27666", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-27666", "url": "https://bugzilla.suse.com/1197133" }, { "category": "external", "summary": "SUSE Bug 1197462 for CVE-2022-27666", "url": "https://bugzilla.suse.com/1197462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "important" } ], "title": "CVE-2022-27666" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "moderate" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28748", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28748" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28748", "url": "https://www.suse.com/security/cve/CVE-2022-28748" }, { "category": "external", "summary": "SUSE Bug 1196018 for CVE-2022-28748", "url": "https://bugzilla.suse.com/1196018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-19T09:03:30Z", "details": "low" } ], "title": "CVE-2022-28748" } ] }
suse-su-2022:0766-1
Vulnerability from csaf_suse
Published
2022-03-09 10:36
Modified
2022-03-09 10:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).
- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
SUSE-2022-766,SUSE-SLE-Module-Live-Patching-15-2022-766,SUSE-SLE-Product-HA-15-2022-766,SUSE-SLE-Product-HPC-15-2022-766,SUSE-SLE-Product-SLES-15-2022-766,SUSE-SLE-Product-SLES_SAP-15-2022-766
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).\n- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-766,SUSE-SLE-Module-Live-Patching-15-2022-766,SUSE-SLE-Product-HA-15-2022-766,SUSE-SLE-Product-HPC-15-2022-766,SUSE-SLE-Product-SLES-15-2022-766,SUSE-SLE-Product-SLES_SAP-15-2022-766", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0766-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0766-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220766-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0766-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" }, { "category": "self", "summary": "SUSE Bug 1107207", "url": "https://bugzilla.suse.com/1107207" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T10:36:15Z", "generator": { "date": "2022-03-09T10:36:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0766-1", "initial_release_date": "2022-03-09T10:36:15Z", "revision_history": [ { "date": "2022-03-09T10:36:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.86.1.aarch64", "product_id": "kernel-syms-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.86.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.86.1.noarch", "product_id": "kernel-devel-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.86.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.86.1.noarch", "product_id": "kernel-docs-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.86.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.86.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.86.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.86.1.noarch", "product_id": "kernel-macros-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.86.1.noarch", "product": { "name": "kernel-source-4.12.14-150.86.1.noarch", "product_id": "kernel-source-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.86.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.86.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.86.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.86.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-4.12.14-150.86.1.s390x", "product_id": "kernel-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.86.1.s390x", "product_id": "kernel-default-base-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.86.1.s390x", "product_id": "kernel-default-man-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.86.1.s390x", "product_id": "kernel-syms-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.86.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.86.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.86.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.86.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.86.1.x86_64", "product_id": "kernel-syms-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le"